There are no reviews yet. Be the first to send feedback to the community and the maintainers!
Venera
A modular exploitation framework extensible with Luawebpwn
Web Vulnerability Detector (XSS,SQL,LFI,XST,WAF)bitmap4shell
A (quite) simple steganography algorithm to hide shellcodes within bitmap image.SurrealCLI
SurrealDB CLI with Autocomplete featureA-xex
This project is part of a school work focusing on network security.Learning-C
My collection of C programming examples.PurpleCommand
Reverse Shell based on SSH over websocket.linux-injection
My collection of research and tools on post-exploitation and evasion against linux environments.ASM
Assembly codesvulnmanager
Vulnerability Manager - For web application.faketelnet
Simple to use Telnet honeypot.PyRAT
Python Remote Access Tool (PoC)h4sh
A utility to create hash signatures from strings.ghoxy
Simple HTTP proxy used for pivoting.XOR-Cipher
Simple encoding for files and messagesMachineLearning
Some machine learning and artificial intelligence in general related studiestic-tac-toe
Tic Tac Toe online multiplayer with websockets.gohttp
Utility for testing host via HTTP.DecBrute
POC: Decentralized brute force escalated from XSS.api_app
A simple back-end template for creating API.physis-sim
Computação cientificaFTPHoney
Fake FTP - HoneypotMy-Exploits
Exploits that I have made for CTF and study purpose.SSHPKM
SSH public key and access manager.TCPSim
TCP/IP protocol from scratch for simulationsLilRSA
Simple RSA library from scratchComputer-Science
Data science with python (basics)VirusTotal-API-Requester
Virus Total API Requester to analyze hash signatures.Love Open Source and this site? Check out how you can help us