bergmpet / cnc-telegramLinks
Python 3 demo of Command and Control (C&C) bot
☆12Updated 5 years ago
Alternatives and similar repositories for cnc-telegram
Users that are interested in cnc-telegram are comparing it to the libraries listed below
Sorting:
- Just a quick and dirty tool I created to automate some of my standard recon/enumeration activities when doing CTFs☆12Updated 4 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- ☆105Updated 4 years ago
- ☆45Updated 3 years ago
- ☆47Updated 4 years ago
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 7 years ago
- Fileless "malware" that bypasses Windows Defender using PowerShell and obfuscation☆116Updated last year
- You don't need wires to be connected☆41Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- Various course materials, scripts, and configurations from my Offensive Security Engineering Course on Udemy☆63Updated 6 months ago
- Repository resource for threat hunter☆158Updated 7 years ago
- Python for Offensive PenTest, published by Packt☆146Updated 2 years ago
- Collection of notes and resources for the CompTIA PenTest+ exam.☆37Updated 6 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- Short checklists for penetration testing methodology☆193Updated 2 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆190Updated last year
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆123Updated 3 years ago
- links collected from SOC Core Skills class☆85Updated 4 years ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆64Updated last year
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆63Updated 5 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- A GUI for MSF Venom that serves the generated payload for you, in addition to launching a listener using the provided port.☆23Updated 5 years ago
- Slides for my conference talks☆44Updated 2 years ago
- This is a repository for network security tools and technologies.☆98Updated 2 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated 2 years ago
- The Chupacabra case study was created by the ADEO dfir team due to the lack of resources and applications in the digital forensics field.…☆22Updated 3 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆107Updated last week
- A collection of resources I'm using while working toward the OSCP☆78Updated 3 years ago
- Python for Defenders Course Resources☆18Updated last month
- ☆30Updated 5 years ago