A simple web application vulnerability lab made for the HackerOne Veterans day event
☆18Mar 10, 2021Updated 5 years ago
Alternatives and similar repositories for O-Course
Users that are interested in O-Course are comparing it to the libraries listed below
Sorting:
- Evil Inject Finder Remote Capability and Parser☆11Nov 22, 2018Updated 7 years ago
- Automatically perform advanced NTLM hash relay attacks☆15Nov 4, 2022Updated 3 years ago
- A simple Python trojan that encrypts the victim's file system and demands ransom so that an attacker can hit Taco Bell with no financial …☆14Feb 5, 2022Updated 4 years ago
- Register various user actions - keystrokes on the computer keyboard, movements and mouse keystrokes☆25Dec 26, 2024Updated last year
- ☆27Feb 6, 2022Updated 4 years ago
- Scripts to check for security issues with SSH keys and authorized_keys files on Linux and other Unix-like operating systems.☆23Sep 29, 2025Updated 5 months ago
- This project can be used to create AMIs based on Kali Linux, a penetration testing distribution.☆21Mar 12, 2026Updated last week
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Jun 14, 2018Updated 7 years ago
- VM escape (QEMU, VirtualBox, VMware)☆17Mar 21, 2022Updated 4 years ago
- ☆112Jul 24, 2023Updated 2 years ago
- Subdomain finder☆10Mar 13, 2025Updated last year
- F# Implementation to spawn shellcode☆47Jun 6, 2018Updated 7 years ago
- OffensivePipeline allows to download, compile (without Visual Studio) and obfuscate C# tools for Red Team exercises.☆88Mar 2, 2022Updated 4 years ago
- Python TCP server for terminal rickrolls☆13Nov 23, 2021Updated 4 years ago
- A proof-of-concept reverse-shell written in rust.☆32Apr 26, 2019Updated 6 years ago
- A free bookmarklet password generator.☆13May 31, 2014Updated 11 years ago
- webshell and nonwebshell samples,which can be used to train machine learning models to detect webshell☆43Apr 13, 2019Updated 6 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- pwncat windows c2 components☆22Jun 21, 2021Updated 4 years ago
- ☆13Jul 13, 2023Updated 2 years ago
- Persistence techniques for windows.☆19Jun 26, 2023Updated 2 years ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Oct 17, 2023Updated 2 years ago
- DNA as an information storage medium using either 4-base codon or binary representations of 256-ASCII☆11Sep 6, 2013Updated 12 years ago
- A formula to calculate bounty amounts.☆15Dec 2, 2017Updated 8 years ago
- ☆56Apr 17, 2025Updated 11 months ago
- A collection of writeups for active HTB boxes.☆11Nov 15, 2018Updated 7 years ago
- WMI Shell project : proof-of-concept of remote access to a Windows machine using only the WMI service.☆44Dec 27, 2018Updated 7 years ago
- Windows 权限提升 BadPotato☆14Jun 12, 2021Updated 4 years ago
- Hyper-V Linux Guest VM Enhancements☆36Sep 16, 2021Updated 4 years ago
- Formidable Pro PDF Extended is a Wordpress plugin that allows you to save/view/download a PDF from the front- and back-end, and automate …☆13Jan 5, 2017Updated 9 years ago
- An Attack Tool for TCP Session Hijacking☆12Nov 7, 2021Updated 4 years ago
- A Los Angeles Times analysis of helicopter accident rates☆11Dec 21, 2020Updated 5 years ago
- About PIVOting☆13Dec 19, 2023Updated 2 years ago
- Evil Reflective DLL Injection Finder☆47Nov 23, 2018Updated 7 years ago
- ☆27Aug 5, 2019Updated 6 years ago
- Explore free, self-hostable network services & web apps: email, file sharing, CMS, and more. Includes setup guides and Docker support for…☆12Mar 4, 2025Updated last year
- Let's Encrypt Revocation Event☆13Mar 5, 2020Updated 6 years ago
- "Locks" your MacBook using your charging cable – an alarm is played if unplugged, not more...☆12Jul 25, 2018Updated 7 years ago