MattiaCossu / PE-LinuxView external linksLinks
my knowledge of linux privilege escalation
☆10Oct 14, 2023Updated 2 years ago
Alternatives and similar repositories for PE-Linux
Users that are interested in PE-Linux are comparing it to the libraries listed below
Sorting:
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 7 months ago
- sandbox☆11Jul 26, 2025Updated 6 months ago
- pyinit is a command-line tool designed to help developers quickly scaffold Python library projects.☆11Dec 3, 2024Updated last year
- This is a python login system with the database(MySql). In this project I have used the Tkinter module for the GUI of the project. Before…☆17Oct 1, 2020Updated 5 years ago
- Japanese Hiragana-Katakana font assets inspired by animation "Kemono-Friends."☆12Feb 26, 2017Updated 8 years ago
- Finally a easy way how to mass-deploy zabbix agent via GPO☆10Mar 18, 2025Updated 10 months ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 3 months ago
- CTF writeups☆16Nov 20, 2025Updated 2 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆12Oct 14, 2024Updated last year
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 6 months ago
- An AWS S3 file manager. It supports keyword search, upload, preview video and archive files into a zip then download it.☆11Mar 20, 2023Updated 2 years ago
- PowerShell Module that converts MSG files to EML files☆11Sep 5, 2019Updated 6 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- A simple Speech-to-Text (STT) / Text-to-Speech (TTS) wrapper for LLMs☆11Oct 22, 2024Updated last year
- ☆10Jul 28, 2021Updated 4 years ago
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- A python wrapper for the BeReal API☆11Sep 27, 2023Updated 2 years ago
- Zeek script library for getting the effective TLD of a domain.☆14Apr 12, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- Common weakness enumeration library for Python (maintained fork of https://github.com/Julian-Nash/cwe )☆15Aug 29, 2024Updated last year
- Quick lookup files for SUNBURST Backdoor☆12Dec 15, 2020Updated 5 years ago
- XLSX parser for nessus and nmap scan results.☆12Nov 22, 2019Updated 6 years ago
- CIFv3 Ubuntu 16.04 Docker Container (Bearded Avenger)☆12Apr 18, 2018Updated 7 years ago
- Cyber-Physical Systems Guide☆15Jul 25, 2021Updated 4 years ago
- A web application built on flask. Using the Spotify API, the application accesses user's playlists and they can download the playlist as …☆13May 16, 2024Updated last year
- ☆11Jun 9, 2020Updated 5 years ago
- Add your configs for tmux☆18Apr 3, 2022Updated 3 years ago
- Inject code into .net applications☆12Nov 7, 2018Updated 7 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆16May 27, 2025Updated 8 months ago
- Port of Mandiant ShellcodeHashes plugin from IDA to BinaryNinja☆11Jul 24, 2024Updated last year
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- Br0ker for keyrolled devices, or devices that don't have any leaked shims.☆18Nov 7, 2025Updated 3 months ago
- Marlin Simulator UI☆15Dec 1, 2025Updated 2 months ago
- Spider or repeater to find all links.☆10Feb 7, 2021Updated 5 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago