☆21Dec 10, 2022Updated 3 years ago
Alternatives and similar repositories for IntroToPython
Users that are interested in IntroToPython are comparing it to the libraries listed below
Sorting:
- PowerShell module that provides some functionality to facilitate automating backup actions of a FortiGate device over SSH. This module al…☆10Feb 10, 2021Updated 5 years ago
- This repository contains a script created by Truesec CSIRT team which can be used to identify signs of compromise and to some extent, mit…☆11Jul 7, 2021Updated 4 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- FreeBSD Bash script to run a rclone backup to Backblaze B2☆13Aug 22, 2025Updated 7 months ago
- Exploit code for CVE-2019-17662☆18Sep 12, 2021Updated 4 years ago
- Documentation Repo for WiFi Pineapple Pager Mods made by Glytch☆32Jan 16, 2026Updated 2 months ago
- Side-by-Side Git, SVN and Bazaar Diff Viewer for Sublime Text 3☆20Mar 17, 2020Updated 6 years ago
- Centralized location to share study group notes.☆17Sep 25, 2019Updated 6 years ago
- Cuckoo Agent.☆23Feb 25, 2019Updated 7 years ago
- Control and telemetry client for the uConsole AIO v2 board, offering both CLI and GUI interfaces for power management, peripheral contro…☆47Mar 5, 2026Updated 2 weeks ago
- ☆23Dec 23, 2025Updated 2 months ago
- ☆19Sep 3, 2018Updated 7 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆50Mar 1, 2018Updated 8 years ago
- PowerShell script for hunting webshells on Microsoft Exchange Servers.☆56Feb 1, 2017Updated 9 years ago
- CLI Frontend for PowerShell Empire.☆49Jun 26, 2021Updated 4 years ago
- guest→system(UAC手动提权)☆74Mar 18, 2020Updated 6 years ago
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- This scoreboard allows you to host your own cybersecurity capture-the-flag (jeopardy-style or attack/defend) competition. Also includes t…☆58Updated this week
- Simple parser framework.☆25Jun 21, 2023Updated 2 years ago
- Svelte 5 Infinite Loader☆104Feb 15, 2026Updated last month
- BackdoorMan is a toolkit that helps you find malicious, hidden and suspicious PHP scripts and shells in a chosen destination.☆77Dec 13, 2022Updated 3 years ago
- Design files for physical radio cases, etc☆66Aug 29, 2024Updated last year
- Welcome! This is where I'll post updates to projects I'm working on, walkthroughs to capture the flag material and any other areas of res…☆50May 4, 2021Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Jun 19, 2020Updated 5 years ago
- Welcome to HackTheArch! A free open source scoring server for cyber Capture the Flag competitions!☆72Mar 8, 2023Updated 3 years ago
- Fast IOC and YARA Scanner☆90Mar 23, 2020Updated 5 years ago
- ☆81Apr 21, 2017Updated 8 years ago
- The opposite of Ruler, provides blue teams with the ability to detect Ruler usage against Exchange.☆96Oct 11, 2017Updated 8 years ago
- Create a list of possible usernames for bruteforcing☆83Feb 18, 2024Updated 2 years ago
- PowerShell No Agent Hunting☆111Apr 23, 2018Updated 7 years ago
- My minimal dotfiles☆173Jan 2, 2022Updated 4 years ago
- A tiny tool built to help AD Admins tame the Protected Users group.☆140Updated this week
- ☆118Jun 4, 2025Updated 9 months ago
- Collection of WiFi Pineapple Pager Repositories☆242Jan 12, 2026Updated 2 months ago
- Dotfiles for my macOS setup☆166Jul 21, 2024Updated last year
- Cuckoo Sandbox is an automated dynamic malware analysis system☆107May 22, 2020Updated 5 years ago