Schedule of my public security training courses!
☆15Apr 13, 2021Updated 4 years ago
Alternatives and similar repositories for training-schedule
Users that are interested in training-schedule are comparing it to the libraries listed below
Sorting:
- check multiple ip reputation☆13Jun 7, 2023Updated 2 years ago
- PMR - PT & VA Management & Reporting is a collaboration platform for pen-testing. PMR Platform is maintained by @SabrySecurity https://sa…☆12Jun 7, 2023Updated 2 years ago
- ☆25Dec 28, 2023Updated 2 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Aug 26, 2018Updated 7 years ago
- dotfiles☆11Mar 10, 2026Updated last week
- Cross platform system wide proxy server & TLS Interception library for Python☆23Aug 19, 2023Updated 2 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆10Jul 6, 2022Updated 3 years ago
- Some security by obscurity using port-jumping.☆14Aug 21, 2025Updated 6 months ago
- A BOF to interact with COM objects associated with the Windows software firewall.☆109Oct 10, 2021Updated 4 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 3 months ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- Companion Worm research☆16Nov 8, 2021Updated 4 years ago
- Pull A List Of 1000 Most Popular Containers On Docker Hub☆15Aug 11, 2020Updated 5 years ago
- Automatic DLL comment link generation and explaination of the DLL Proxying techniques☆10Aug 19, 2021Updated 4 years ago
- SamrSearch can get user info and group info with MS-SAMR.☆15Feb 15, 2022Updated 4 years ago
- WAF Cookie Fetcher is a Burp Suite extension written in Python, which uses a headless browser to obtain the values of WAF-injected cookie…☆16Jan 16, 2018Updated 8 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- EQGRP: Replicating DarkPulsar, an DLL capable of hooking Security Package Method Tables on the Heap!☆10Oct 11, 2020Updated 5 years ago
- A small collection of Burp Suite extensions, written in Python☆10Nov 19, 2016Updated 9 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- collection of beacon object file (Cobalt strike)☆12Jan 21, 2023Updated 3 years ago
- Dirfuzz by golang☆15Feb 28, 2023Updated 3 years ago
- Eset-Unload is a C++ tool that interacts with a process's loaded modules to identify and unload the ebehmoni.dll module, typically found …☆12Apr 21, 2025Updated 10 months ago
- Test domain expiration dates.☆12Dec 2, 2022Updated 3 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that obtain SYSTEM privilege with SeImpersonate privilege by passing a malicious IUnknwon object t…☆13Feb 4, 2024Updated 2 years ago
- Repository to gather the BOF files I will be developing☆11Oct 1, 2024Updated last year
- wtftp.py is a tool to attack Microsoft Deployment Toolkit (MDT) and Windows Deployment Services (WDS).☆30Jan 22, 2026Updated last month
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Dump exposed HTTP .git fast☆51Nov 11, 2022Updated 3 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- Artifact collection tool for *nix systems☆213Mar 20, 2024Updated 2 years ago
- Detect VM and Hypervisor☆10Jun 16, 2021Updated 4 years ago
- Scripts to automate RECON process☆11Aug 31, 2025Updated 6 months ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- Hourly Checked and Updated IP Ranges of AWS Servers☆20Feb 27, 2024Updated 2 years ago
- BOF implementation of Adopt. Spawns a process from a process. Can sometimes be used to run a session > 0 process from session 0.☆17Jul 22, 2022Updated 3 years ago