Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
-
Updated
May 29, 2024 - C
Wazuh - The Open Source Security Platform. Unified XDR and SIEM protection for endpoints and cloud workloads.
PoC for a sleep obfuscation technique leveraging waitable timers to evade memory scanners.
OSINT Template Engine
Local privilege escalation via PetitPotam (Abusing impersonate privileges).
Leaked hacking tools found in vulnerable SSH servers.
Localroot-ALL-CVE~
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
👾 𝘁𝗼𝗼𝗹𝘀 𝗳𝗼𝗿 𝘀𝗲𝗰𝘂𝗿𝗶𝘁𝘆 𝗿𝗲𝘀𝗲𝗮𝗿𝗰𝗵𝗲𝗿𝘀: 𝗽𝗲𝗻𝘁𝗲𝘀𝘁𝗶𝗻𝗴, 𝗖𝗧𝗙𝘀 & 𝘄𝗮𝗿𝗴𝗮𝗺𝗲𝘀
An experimental project to demonstrate how a user keyboard input may be sniffed through the pattern analysis of the sounds emitted by the keystrokes.
KrackPlus seeks to handle dependencies and parse the output from two scripts made by Mathy Vanhoef; with KrackPlus users can scan their devices to determine whether they are vulnerable to key reinstallation attacks, or attack those devices.
InfoSec Binary Hex Editor with Retro Disassemblers
The continuation of the iplog project. Originally by @ryan-mccabe. A TCP/IP traffic logger. for Linux systems.
Some network covert channel projects of my own research, containing a protocol channel tool (protocol switching covert channel, PCT/PSCC), a protocol hopping covert channel (PHCC) tool, the protocol channel-aware active warden (PCAW) and ... VSTT.
An example kernel module rootkit to get reverse shell
The Covert Channel Educational Analysis Protocol (CCEAP) is a network protocol designed for teaching covert channels to professionals and students in higher education. It is also an easy-to-use covert channel traffic generator. The basis for CCEAP are so-called `hiding patterns'.
A simple tool that aims to efficiently and quickly parse the outputs of web scraping tools like gau
Information security project. This is a collection of ELF Binary exploits to expand your knowledge of security breaches, undefined behaviour and memory management.
Information security project. This is a collection of ELF binaries exploits to better understand how memory works.
A simple backdoor for servers and embedded systems.
Add a description, image, and links to the infosec topic page so that developers can more easily learn about it.
To associate your repository with the infosec topic, visit your repo's landing page and select "manage topics."