my knowledge of linux privilege escalation
☆11Oct 14, 2023Updated 2 years ago
Alternatives and similar repositories for PE-Linux
Users that are interested in PE-Linux are comparing it to the libraries listed below
Sorting:
- Coerce Windows authentication by generating, distributing, and cleaning up poisoned files at scale.☆34Jun 17, 2025Updated 8 months ago
- sandbox☆11Jul 26, 2025Updated 7 months ago
- 2025 Game-Off Game Jam☆21Jan 17, 2026Updated last month
- Python class for interacting with Project Zomboid servers using RCON☆10Oct 17, 2025Updated 4 months ago
- Use Forgejo with Coolify just like GitHub! Native integration for browsing repos, automatic webhooks, and push-to-deploy☆13Jul 16, 2025Updated 7 months ago
- Designed an android application using android studio 1.3, java, xml. This application is a digital version of the actual Monopoly game. I…☆10Sep 25, 2021Updated 4 years ago
- CTF writeups☆16Nov 20, 2025Updated 3 months ago
- Finally a easy way how to mass-deploy zabbix agent via GPO☆10Mar 18, 2025Updated 11 months ago
- PowerShell tool to enumerate existing exclusions in Windows Defender as low privileged user☆11Oct 14, 2024Updated last year
- This is a python login system with the database(MySql). In this project I have used the Tkinter module for the GUI of the project. Before…☆17Oct 1, 2020Updated 5 years ago
- ☆10Oct 18, 2024Updated last year
- pyinit is a command-line tool designed to help developers quickly scaffold Python library projects.☆11Dec 3, 2024Updated last year
- Japanese Hiragana-Katakana font assets inspired by animation "Kemono-Friends."☆12Feb 26, 2017Updated 9 years ago
- Fix for the CVE-2021-36934☆10Oct 15, 2021Updated 4 years ago
- How to create VMware vagrant box☆11May 10, 2020Updated 5 years ago
- An AWS S3 file manager. It supports keyword search, upload, preview video and archive files into a zip then download it.☆11Mar 20, 2023Updated 2 years ago
- Browser-based packet viewer powered by Wireshark☆20Jul 28, 2025Updated 7 months ago
- mt-predictor は実行中の Python プロセスのメモリをスキャンして、random.random() が次に生成する値を完全に予測するためのものです。☆16May 27, 2025Updated 9 months ago
- NDISPktScan is a plugin for the Volatility Framework. It parses the Ethernet packets stored by ndis.sys in Windows kernel space memory.☆12Oct 23, 2015Updated 10 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- Cyber-Physical Systems Guide☆15Jul 25, 2021Updated 4 years ago
- Reverse-engineering, documenting and hacking a dog shock collar for use as a sex toy☆10Jun 13, 2021Updated 4 years ago
- This directory contains random scripts from threat hunting or malware research☆11Feb 15, 2018Updated 8 years ago
- OSCP Exam Report Template in Markdown☆11Jan 14, 2021Updated 5 years ago
- Utility to attempt to find the passphrase of a GPG secret key☆10May 23, 2024Updated last year
- Training materials I've written.☆11Nov 11, 2025Updated 3 months ago
- The evolution of NxRansomware☆11Jun 14, 2019Updated 6 years ago
- Just a vault template to help someone on the certificate.☆12Sep 3, 2025Updated 6 months ago
- OSCP preparation☆12Sep 18, 2025Updated 5 months ago
- Marlin Simulator UI☆15Feb 19, 2026Updated 2 weeks ago
- Extra cmdlets to help with quering security related information from Azure☆14Sep 16, 2024Updated last year
- ☆18Apr 3, 2016Updated 9 years ago
- A python wrapper for the BeReal API☆11Sep 27, 2023Updated 2 years ago
- 界隈曲の情報をまとめたwebアプリ☆16Feb 24, 2026Updated last week
- Br0ker for keyrolled devices, or devices that don't have any leaked shims.☆18Nov 7, 2025Updated 3 months ago
- ☆11Jun 9, 2020Updated 5 years ago
- Common weakness enumeration library for Python (maintained fork of https://github.com/Julian-Nash/cwe )☆15Aug 29, 2024Updated last year
- All things Binary Exploitation, Memory, Assembly and Corruptions.☆10Sep 25, 2020Updated 5 years ago
- CLI Tools to open, extract and mount FTK Imager's AccessData AD1 forensic images on linux.☆17May 27, 2025Updated 9 months ago