Collection of scripts created while taking the SecurityTube Python Scripting Expert course
☆56Apr 12, 2020Updated 6 years ago
Alternatives and similar repositories for SPSE
Users that are interested in SPSE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository includes the instructor examples along with personal solutions for all the modules of SPSE. SPSE (Security Tube Python Sc…☆26Aug 2, 2019Updated 6 years ago
- A script made to validate numerous cryptographic-related vulnerabilities such as: Heartbleed, Logjam, CRIME,POODLE, DROWN, Weak Cipher Su…☆19Jul 25, 2016Updated 9 years ago
- Reverse NTP remote access trojan in python, for penetration testers☆62Oct 11, 2015Updated 10 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Mar 21, 2017Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- A python based dropper, that uses steganography and an image over http to transfer a file☆59Oct 10, 2015Updated 10 years ago
- Metadefender Core (Metascan v.4 and v.3) analysis module for Viper malware analysis framework☆10Jan 6, 2021Updated 5 years ago
- Offensive Data Storage☆61Sep 1, 2016Updated 9 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆16Nov 8, 2017Updated 8 years ago
- A shell / chat bot for XMPP and cloud services☆48Oct 10, 2015Updated 10 years ago
- A reverse ssh shell written in python, intended for penetration testers to use as a covert channel on windows☆87Oct 10, 2015Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆47Oct 11, 2018Updated 7 years ago
- GoLang Scripting Expert, a repo for template scripts regarding basic golang functions, many with a security focus☆22Jun 22, 2020Updated 5 years ago
- A python based https remote access trojan for penetration testing☆84Jan 7, 2016Updated 10 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- PowerShell Scripting Expert repository, contains template code for security and administrative scripting, largely derived through taking …☆88Jun 13, 2019Updated 6 years ago
- Automatically performs the SMB relay attack☆73May 13, 2016Updated 9 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- Fileless SQL Server CLR-based Custom Stored Procedure Command Execution☆35Mar 6, 2017Updated 9 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- ARDvark parses the Apple Remote Desktop (ARD) files to pull out application usage, user activity, and filesystem listings.☆36Jun 1, 2023Updated 2 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- ☆33Aug 10, 2019Updated 6 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CScriptShell, a Powershell Host running within cscript.exe☆163Apr 11, 2017Updated 9 years ago
- InfoPath Phishing Repo Resource☆67Oct 26, 2017Updated 8 years ago
- A set of local skype transforms for Maltego to utilise Skype and search the directory☆42Oct 28, 2015Updated 10 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- This is a fuzzer for automated web application scanners and vulnerability scanners. The idea is to send an unexpectedly large response to…☆24Oct 11, 2015Updated 10 years ago
- Empire HTTP(S) C2 redirector setup script☆48Jul 10, 2018Updated 7 years ago
- PurpleSpray is an adversary simulation tool that executes password spray behavior under different scenarios and conditions with the purpo…☆51Aug 15, 2019Updated 6 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 3 months ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- pwntools for go!☆12Jul 14, 2019Updated 6 years ago
- Use ExpiredDomains.net and BlueCoat to find useful domains for red team.☆184Jun 10, 2022Updated 3 years ago
- Automatically parses and attacks BloodHound-generated graphs☆43Jul 16, 2018Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- a tool that facilitates eavesdropping and man-in-the-middle attacks☆16Mar 20, 2013Updated 13 years ago
- Obtains a crackable hash for the current user account☆23Feb 3, 2019Updated 7 years ago
- Tater is a PowerShell implementation of the Hot Potato Windows Privilege Escalation exploit from @breenmachine and @foxglovesec☆454Apr 22, 2016Updated 10 years ago