A collection of notes and script that will help you learn basics of hacking with Python
☆34Nov 3, 2014Updated 11 years ago
Alternatives and similar repositories for HackPy
Users that are interested in HackPy are comparing it to the libraries listed below
Sorting:
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Tool development for monitoring packets in local networks.☆18Nov 7, 2016Updated 9 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- Solutions for various crackmes☆20Jan 13, 2013Updated 13 years ago
- 微软7月布丁增加内存延迟释放机制☆11Jul 19, 2014Updated 11 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 6 months ago
- x86/64 Linux Debugger (written w/ python stdlib,ctypes/ptrace)☆10May 16, 2017Updated 8 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- ☆12Apr 13, 2017Updated 8 years ago
- Pascal interpreter for Android.☆23Sep 16, 2010Updated 15 years ago
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- ☆13Oct 29, 2014Updated 11 years ago
- RC4 Encryption with CryptoAPI and C☆15Apr 6, 2016Updated 9 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- A tool for analyzing code coverage and path coverage without using xdebug.☆23Sep 13, 2012Updated 13 years ago
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Source for many challenges from DEF CON 21 CTF Qualifier☆39Apr 6, 2014Updated 11 years ago
- Scanner for Regin Virtual Filesystems☆25Jan 20, 2015Updated 11 years ago
- WebShell Collect☆14Dec 7, 2015Updated 10 years ago
- The Demo for CVE-2018-1000006☆40Jan 25, 2018Updated 8 years ago
- Portable utility to check if a machine has been infected by Shamoon2☆15Jan 13, 2017Updated 9 years ago
- Some Of MY TOOLS☆11Jul 4, 2024Updated last year
- Scan for LLTD-enabled hosts on your network☆24Mar 8, 2021Updated 4 years ago
- DiskCryptor - it's a free solution that allows you to encrypt disk partitions, including system partition.☆17Dec 7, 2011Updated 14 years ago
- ☆11Feb 20, 2015Updated 11 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- Collection of IDA Pro plugins I wrote over the years☆24May 8, 2010Updated 15 years ago
- ☆16Aug 11, 2017Updated 8 years ago
- ☆21Nov 3, 2018Updated 7 years ago
- Anti-Anti-Debugger Plugins☆20Jul 27, 2013Updated 12 years ago
- Reverse shell using socket programming in python☆15Dec 8, 2022Updated 3 years ago
- A Cross Platform Problem Recommendation Engine☆18Jan 25, 2018Updated 8 years ago
- buffer overflow examples☆23Dec 20, 2017Updated 8 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Slides and examples to accompany the September 25th invited talk at SAT 2015☆14Sep 30, 2015Updated 10 years ago
- Windows x86 Hardware Breakpoint class for Windows >Vista☆23Aug 7, 2016Updated 9 years ago
- A Simple Password Protected Back Door written in Python3☆21Jul 1, 2023Updated 2 years ago
- windows api hooking (user mode) sample☆21Jul 24, 2014Updated 11 years ago
- ☆52Apr 14, 2015Updated 10 years ago