There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Venera
A modular exploitation framework extensible with Luawebpwn
Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)SurrealCLI
SurrealDB CLI with Autocomplete featureA-xex
This project is part of a school work focusing on network security.Learning-C
My collection of C programming examples.ASM
Assembly codesvulnmanager
Vulnerability Manager - For web application.faketelnet
Simple to use Telnet honeypot.PyRAT
Python Remote Access Tool (PoC)linux-injection
My collection of research and tools on post-exploitation and evasion against linux environments.h4sh
A utility to create hash signatures from strings.PurpleCommand
Reverse Shell based on SSH over websocket.bitmap4shell
A (quite) simple steganography algorithm to hide shellcodes within bitmap image.ghoxy
Simple HTTP proxy used for pivoting.XOR-Cipher
Simple encoding for files and messagesMachineLearning
Some machine learning and artificial intelligence in general related studiesgohttp
Utility for testing host via HTTP.FTPHoney
Fake FTP - Honeypottic-tac-toe
Tic Tac Toe online multiplayer with websockets.DecBrute
POC: Decentralized brute force escalated from XSS.api_app
A simple back-end template for creating API.physis-sim
Computação cientificaMy-Exploits
Exploits that I have made for CTF and study purpose.TCPSim
TCP/IP protocol from scratch for simulationsSSHPKM
SSH public key and access manager.LilRSA
Simple RSA library from scratchComputer-Science
Data science with python (basics)VirusTotal-API-Requester
Virus Total API Requester to analyze hash signatures.Love Open Source and this site? Check out how you can help us