Coder Social home page Coder Social logo

deeby's Projects

aclpwn.py icon aclpwn.py

Active Directory ACL exploitation with BloodHound

ad-attack-defense icon ad-attack-defense

Attack and defend active directory using modern post exploitation adversary tradecraft activity

ad-ldap-enum icon ad-ldap-enum

An LDAP based Active Directory user and group enumeration tool

ad-password-protection icon ad-password-protection

Active Directory password filter featuring breached password checking and custom complexity rules

adalanche icon adalanche

Active Directory ACL Visualizer and Explorer - who's really Domain Admin?

adaudit icon adaudit

Active Directory Audit Tools for IT Audits

adaudit-1 icon adaudit-1

Powershell script to do domain auditing automation

afl-dyninst icon afl-dyninst

American Fuzzy Lop + Dyninst == AFL Fuzzing blackbox binaries

afl-fuzz icon afl-fuzz

Mirror of afl-fuzz, a fuzzer with compiler instrumentation. The original source is only distributed over HTTP. SHA256 checksums verified by downloading from multiple networks.

afl-mothership icon afl-mothership

Manage and run multiple synchroned AFL fuzzers on the AWS cloud

afl-remote icon afl-remote

Remote administration web server for american fuzzy lop

afl-unicorn icon afl-unicorn

afl-unicorn let's you fuzz any piece of binary that can be emulated by Unicorn Engine.

afl-utils icon afl-utils

Utilities for automated crash sample processing/analysis, easy afl-fuzz job management and corpus optimization

aflgo icon aflgo

Directed Greybox Fuzzing with AFL

aflpin icon aflpin

aflpin enables afl to fuzz blackbox binaries using a pin tool to trace execution branches.

aflplusplus-socket-mode icon aflplusplus-socket-mode

The fuzzer afl++ is afl with community patches, qemu 5.1 upgrade, collision-free coverage, enhanced laf-intel & redqueen, AFLfast++ power schedules, MOpt mutators, unicorn_mode, and a lot more!

airflow icon airflow

Apache Airflow - A platform to programmatically author, schedule, and monitor workflows

al-khaser icon al-khaser

Public malware techniques used in the wild: Virtual Machine, Emulation, Debuggers, Sandbox detection.

am-i-affected-by-meltdown icon am-i-affected-by-meltdown

Proof-of-concept / Exploit / checks whether system is affected by Variant 3: rogue data cache load (CVE-2017-5754), a.k.a MELTDOWN.

android-insecurebankv2 icon android-insecurebankv2

Vulnerable Android application for developers and security enthusiasts to learn about Android insecurities

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.