vpereira / seccheck
upstream for seccheck
☆15Updated 6 years ago
Alternatives and similar repositories for seccheck:
Users that are interested in seccheck are comparing it to the libraries listed below
- iknowthis Linux SystemCall Fuzzer☆20Updated 5 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- DeepToad is a library and a tool to clusterize similar files using fuzzy hashing☆20Updated 4 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Updated 5 months ago
- Linux-KVM with rVMI extensions☆22Updated 7 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Updated 7 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Main repository to pull all Cisco related projects.☆15Updated 7 years ago
- Exploits for TRENDNet routers☆13Updated 4 years ago
- suspect is a simple bash triage tool☆18Updated 6 years ago
- Ccollection of Linux loadable kernel modules aimed to logs any user action☆25Updated 6 years ago
- Solutions to the RPISEC MBE / Modern Binary Exploitation VM & course.☆19Updated 8 years ago
- Broken web app intentionally built with pentesting obstacles☆15Updated 5 years ago
- Print the strings of encoded printable characters in files☆12Updated 9 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- ☆15Updated 8 years ago
- cisco-auditing-tool : Scans cisco routers for common vulnerabilities☆13Updated 9 years ago
- Working through Practical Malware Analysis from No Starch Press☆13Updated 7 years ago
- Linux and Windows Hardening Points☆12Updated 7 years ago
- Archive Mirror for recently republished PoC/Exploit code☆17Updated 7 years ago
- Antivirus for Linux operating system☆9Updated 8 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Updated 8 years ago
- A script to automate Jenkins credential store decryption☆17Updated 6 years ago
- Abusing the FreeBSD MAC framework for rootkits☆11Updated 7 years ago
- ☆16Updated 8 years ago
- Volatility plugin to extract X screenshots from a memory dump☆37Updated 6 years ago
- ☆28Updated 9 years ago
- #INFILTRATE19 raptor's party pack.☆30Updated last year