Starred repositories
🍀 sweet looking lockscreen for linux system
This repo contains useful information for newbies in C++ chats
Exercise writeups from the book Practical Malware Analysis.
Daemon to ban hosts that cause multiple authentication errors
The original sources of MS-DOS 1.25, 2.0, and 4.0 for reference purposes
A not so awesome list of malware gems for aspiring malware analysts
List of awesome reverse engineering resources
The Cyber Swiss Army Knife - a web app for encryption, encoding, compression and data analysis
brimstone / metasploitable3
Forked from rapid7/metasploitable3Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
A simple, modern server dashboard, primarily used by smaller private servers
Monitoring a Kubernetes cluster involves deploying and utilizing the Wazuh agent within the Kubernetes environment.
PowerSploit - A PowerShell Post-Exploitation Framework
Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.
OWASP Mutillidae II is a free, open-source, deliberately vulnerable web application providing a target for web-security training. This is an easy-to-use web hacking environment designed for labs, s…
Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of 2-factor authentication
alexusMailer 2.* - sendmail anonymous mailing script. йаПосылалка 2.* - скрипт анонимной отправки электронной почты
A collection of awesome penetration testing resources, tools and other shiny things
an awesome list of honeypot resources