ai2cyber / pyvntLinks
A class validation and transformation library, to ensure secure data structures in Python.
☆10Updated last year
Alternatives and similar repositories for pyvnt
Users that are interested in pyvnt are comparing it to the libraries listed below
Sorting:
- Python's dependable dependency injection container for managing lifecycles and registrations.☆14Updated last year
- Kibana app for RedELK☆18Updated 2 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Updated 6 years ago
- Standardizing Security Titles☆13Updated last month
- Free Email Providers☆11Updated 2 years ago
- Assists in mass exportation of Nessus scans☆20Updated 7 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- ☆19Updated 5 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A collection of tools adversaries commonly use in an attack.☆14Updated last year
- visually see issues with supported cipher suites☆17Updated last year
- A Tool for cross-platform System Enumeration☆12Updated 8 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆15Updated last year
- Extract credentials from lsass remotely☆16Updated 6 years ago
- Data EXfiltration TestER☆21Updated 6 years ago
- Dumping App Bound Protected Credentials & Cookies Without Privileges.☆59Updated 3 months ago
- ☆16Updated 8 years ago
- A Canary which fires when uninstalled☆34Updated 4 years ago
- ☆13Updated 4 years ago
- Test Azure environment for MFA misconfigurations☆12Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- ☆17Updated 2 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Updated 8 years ago
- ☆18Updated 2 years ago
- Docker container for datasploit framework☆25Updated 8 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Updated 5 years ago
- buffer overflow examples☆23Updated 8 years ago
- Malsys is a project designed to validate and analyze files for potential malware signatures.☆21Updated 2 years ago