cR's repositories
animation-circle
2016matlabClass hw02example
attack-flow
ATT&CK Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
ComplexTree
Using MATLAB GUI to plot complex tree
crawler-image
download image from google image website with your own keyword
MjpgStreamer-setup
setup mjpg-streamer server on raspberry pi (raspbian)
readStreamer
Use python to read mjpg-streamer http server on raspberry pi, and calculate optical flow and detect motion.
SimulateDataTransfer
Simulate data transfer from senser1, 2, 3 to part3 through part2
TSP
genetic algorithm to calculate the minimum distance
container-security-checklist
Checklist for container security - devsecops practices
CrackMapExec
A swiss army knife for pentesting networks
CVE-2019-0708
Scanner PoC for CVE-2019-0708 RDP RCE vuln
CVE-2022-0847-DirtyPipe-Exploit
A root exploit for CVE-2022-0847 (Dirty Pipe)
mbtget
A simple modbus/TCP client write in pure Perl.
PENTESTING-BIBLE
This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 2000 links & 2000 pdf files at any time soon.Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
security
Some of my security stuff and vulnerabilities. Nothing advanced. More to come.
Security-PPT
Security-related Slide Presentation(大安全各领域各公司各会议分享的PPT)
smbdoor
Windows kernel backdoor via registering a malicious SMB handler
Updated-Carbanak-Source-with-Plugins
https://twitter.com/itsreallynick/status/1120410950430089224
VMAttack
VMAttack PlugIn for IDA Pro
ZombieLoad
Proof-of-concept for the ZombieLoad attack