Git Product home page Git Product logo

al-ryan-breed's Projects

ammyy-v3 icon ammyy-v3

Ammyy v3 Source Code leak , with ❤️ <3

ansible-cloudformation icon ansible-cloudformation

Ansible role to render an arbitrary number of Jinja2 templates into cloudformation files and create any number of stacks.

azazel icon azazel

Azazel is a userland rootkit based off of the original LD_PRELOAD technique from Jynx rootkit. It is more robust and has additional features, and focuses heavily around anti-debugging and anti-detection.

bella icon bella

A pure python, post-exploitation, data mining tool and remote administration tool (RAT) for macOS / OS X. 🍎💻

cfn-flip-service icon cfn-flip-service

A serverless API that converts CloudFormation templates between JSON and YAML formats

daq icon daq

A git mirror of daq.

docker-tcpreplay icon docker-tcpreplay

Docker container to send traffic for dev/troubleshooting to another container in docker using TCPREPLAY

maus icon maus

Lightweight remote administrative client written in Java.

metasploitable3 icon metasploitable3

Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

py-idstools icon py-idstools

idstools: Snort and Suricata Rule and Event Utilities in Python (Including a Rule Update Tool)

resume icon resume

Working repository for resume and C.V. This is a superset of information that would actually be included in a resume submission, but is detailed here to supplement my own memory. This is also my playground for different flavors of markup and layout.

snort-rule icon snort-rule

parses and generates Snort rules similar to PERL's Snort::Rule

stitch icon stitch

Python Remote Administration Tool (RAT)

sudo_sniff icon sudo_sniff

Steal user's password when running sudo for post-exploitation purposes

thefatrat icon thefatrat

Thefatrat a massive exploiting tool revealed >> An easy tool to generate backdoor and easy tool to post exploitation attack like browser attack,dll . This tool compiles a malware with popular payload and then the compiled malware can be execute on windows, android, mac . The malware that created with this tool also have an ability to bypass most AV software protection .

unifiedbeat icon unifiedbeat

Unifiedbeat reads records from Unified2 binary files generated by network intrusion detection software and indexes the records in Elasticsearch.

websnort icon websnort

Web service for scanning pcaps with snort

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.