All Zero Nights 2016 'A threat hunter himself' stuff
☆16Nov 18, 2016Updated 9 years ago
Alternatives and similar repositories for ZN2016
Users that are interested in ZN2016 are comparing it to the libraries listed below
Sorting:
- ☆17Mar 22, 2018Updated 7 years ago
- Script to perform Linux Memory Diff Analysis Using Volatility☆24Sep 20, 2015Updated 10 years ago
- Backdoor detection for VMware view☆13Jan 5, 2022Updated 4 years ago
- ☆16Dec 26, 2022Updated 3 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Monitoring attacks with elastick, kibana, grok, logstash and beats☆20Mar 2, 2017Updated 9 years ago
- BSidesLV 2015 Exploit Kit Analysis Workshop Files☆27Aug 5, 2015Updated 10 years ago
- An ICAP Server with yara scanner for URL and content.☆58Dec 19, 2024Updated last year
- Symbol REPL☆31Mar 4, 2018Updated 8 years ago
- ☆68Jun 21, 2017Updated 8 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- webshare is a CLI tool that provides web-interface for your local files☆13Dec 2, 2018Updated 7 years ago
- Powershell to read ETL file on an interval and convert it to an EVTX (so Windows Event Forwarding can 'subscribe')☆11May 16, 2017Updated 8 years ago
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Tool useful to discover services behind unknown ports☆14May 20, 2021Updated 4 years ago
- ☆11Jul 19, 2020Updated 5 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago
- Scan for and exploit Consul agents☆39Jun 11, 2019Updated 6 years ago
- Thug's Rumāl: a Thug's dress & weapon☆37Jan 24, 2017Updated 9 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- PowerShell Module to provide Network Block Device like functionality on Windows Hosts☆13Sep 27, 2015Updated 10 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Проверка лицензий установленных программ☆12Apr 11, 2020Updated 5 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Python scripts to exploit CVE-2014-9016 and CVE-2014-9034☆13Dec 27, 2014Updated 11 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 5 months ago
- Continuous Wavelet Transform. Based on the work of Roger Fearick.☆13Feb 22, 2016Updated 10 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Kippo configured to be a backdoored netscreen☆11Dec 22, 2015Updated 10 years ago
- a pastebin clone written in python, using bottle and mongodb☆19Jun 3, 2010Updated 15 years ago
- Ansible playbook and related roles for setting up a Tor relay.☆11May 25, 2014Updated 11 years ago
- ☆10Jun 22, 2025Updated 8 months ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Cryptowall Tooling & Information☆37Mar 3, 2016Updated 10 years ago