Basic Website template Django 2.2 Example + Python3
☆54Feb 9, 2022Updated 4 years ago
Alternatives and similar repositories for Django-example
Users that are interested in Django-example are comparing it to the libraries listed below
Sorting:
- ☆22Aug 11, 2021Updated 4 years ago
- Host Discovery Tool☆10Jan 17, 2022Updated 4 years ago
- Exploit scripts☆12Apr 10, 2022Updated 3 years ago
- Showcase of DNS Exfiltration and Infiltration☆60Feb 26, 2021Updated 5 years ago
- Write-ups of Try Hack me challenge machines☆10Mar 29, 2024Updated last year
- Files for http://blog.deniable.org/posts/windows-callbacks/☆12Jan 1, 2023Updated 3 years ago
- ☆1,156Apr 21, 2021Updated 4 years ago
- ☆29May 8, 2021Updated 4 years ago
- A command line tool to search AttackerKB.☆53Jan 16, 2021Updated 5 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Feb 24, 2020Updated 6 years ago
- Cobalt Strike BOFS☆16Dec 20, 2023Updated 2 years ago
- A BOF for lazy people☆23Apr 4, 2024Updated last year
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 7 months ago
- Hey there, this repository will be/is managed by JHD_Bot, No PR's are allowed and also some resources may expire as the bot just reads #r…☆18Jun 24, 2021Updated 4 years ago
- ☆18Jan 27, 2021Updated 5 years ago
- Cannon is a post-exploitation framework fully developed using python3. You will be able to download and upload files, run pre-defined mod…☆19Jul 21, 2021Updated 4 years ago
- Powershell script which will take any payload and put it in the a bat script which delivers the payload. The payload is delivered using e…☆57Apr 13, 2024Updated last year
- Bug Bounty Recon Tools☆28Apr 13, 2024Updated last year
- Run payload like a Lazarus Group (UuidFromStringA). C++ implementation☆20Jul 24, 2022Updated 3 years ago
- Create a list of possible usernames for bruteforcing☆83Feb 18, 2024Updated 2 years ago
- SharePoint Security Auditor☆21Jan 16, 2016Updated 10 years ago
- This exploit use PEB walk technique to resolve API calls dynamically, obfuscate all API calls to perform process injection.☆26Jul 26, 2024Updated last year
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- ☆23Apr 22, 2020Updated 5 years ago
- SSTI Payload Generator☆92Aug 8, 2022Updated 3 years ago
- the most basic DLL ever to pop a cmd.☆24Jul 11, 2020Updated 5 years ago
- ☆221Jul 20, 2020Updated 5 years ago
- c# reverse shell poc☆26Dec 22, 2025Updated 2 months ago
- Don't expect much :) Just expect to learn new things!☆64Mar 11, 2021Updated 4 years ago
- Consolidation of various resources related to Microsoft Sysmon & sample data/log☆122Sep 20, 2021Updated 4 years ago
- Dirtycow exploit for both 32 and 64-bit☆29Jul 23, 2018Updated 7 years ago
- This is the repo of the Flutter Bootcamp by Dev Community Nepal☆14May 25, 2023Updated 2 years ago
- ☆336Jan 23, 2020Updated 6 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Sep 7, 2024Updated last year
- This is Visual C# code that will create a new user named "mcfatty" when run as a service.☆30Oct 4, 2018Updated 7 years ago
- ☆82Apr 28, 2025Updated 10 months ago
- Resources for AD penetration testing and security☆33Feb 21, 2022Updated 4 years ago
- Simple script for web directory scanning☆33May 22, 2023Updated 2 years ago