This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE - Securitytube Python Scripting Expert Course Problems Solution. The SecurityTube Python Scripting Expert (SPSE) is an online certification which will help you gain mastery over Python scripting and its applicat…
☆21Mar 21, 2017Updated 9 years ago
Alternatives and similar repositories for SPSE
Users that are interested in SPSE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of collected articles and resources from the website Peerlyst☆17Dec 14, 2016Updated 9 years ago
- The following repository contains the SecurityTube Linux Assembly Expert assignments, and exam☆18Nov 27, 2017Updated 8 years ago
- Resource links (video, slides & code) for my conference talks | presentations | workshops☆21Nov 17, 2025Updated 4 months ago
- Social Engineering for the Blue Team☆11Feb 1, 2024Updated 2 years ago
- Burp Suite extension to perform Kerberos authentication☆12Jan 19, 2026Updated 2 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- The PDF Metadata Burp Extension provides an additional passive Scanner check for metadata in PDF files.☆11Jan 10, 2017Updated 9 years ago
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- BurpSuite Pro Python Extension☆18Jul 11, 2013Updated 12 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A collection of short scripts for analysis, encryption and forensics, that can be used for CTF and/or security assessments☆10Sep 22, 2015Updated 10 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- playing around with food and drink sites and OSINT☆14Oct 15, 2018Updated 7 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Spy Agency Teasing☆14Jan 2, 2015Updated 11 years ago
- ☆24Nov 11, 2025Updated 5 months ago
- A program to monitor network traffic and detect unauthorized sessions.☆42Dec 6, 2010Updated 15 years ago
- PHP tool to test XSS☆22Nov 5, 2019Updated 6 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- A modular framework and program for synchronous pwning with ssh, powered by Python 3, for educational and controlled penetration testing…☆10Sep 4, 2016Updated 9 years ago
- ☆11Jun 11, 2025Updated 10 months ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Jan 17, 2018Updated 8 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Capture the flag - security challenges☆13Feb 29, 2016Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Defensive Origins Training Schedule☆39Dec 11, 2023Updated 2 years ago
- Training resources for LFCS certification (Linux Foundation Certified System Administrator)☆13Jul 26, 2015Updated 10 years ago
- ☆12May 9, 2017Updated 8 years ago
- "An Introduction to Windows Exploit Development" is an open sourced, free Windows exploit development course I created for the Southeast …☆41Apr 17, 2020Updated 5 years ago
- Hacking challenges☆16Oct 17, 2019Updated 6 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Try harder to bypass that WAF...☆14Jan 4, 2015Updated 11 years ago