Files for my Python3 Create Your Own Tool Series
☆25Jul 21, 2022Updated 3 years ago
Alternatives and similar repositories for PythonCreateYourOwnSeries
Users that are interested in PythonCreateYourOwnSeries are comparing it to the libraries listed below
Sorting:
- Obtain and parse SSL certificates☆86Nov 19, 2021Updated 4 years ago
- Handy scripts and one-liners to make life easier☆36Mar 6, 2023Updated 3 years ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- basic proxy as an azure function serverless app☆17Jan 12, 2023Updated 3 years ago
- ☆38Feb 5, 2025Updated last year
- Simple CLIENT side bypass for the Microsoft Defender for Cloud Apps Proxy☆16Apr 8, 2022Updated 3 years ago
- This module mangles two lists of names together to generate a list of potential email addresses or usernames. It can also be used to simp…☆51Sep 25, 2017Updated 8 years ago
- We can Use this tool to find out sensitive data such as API keys, hardcoded credentials etc.☆24Dec 18, 2021Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Super organized and flexible script for sending phishing campaigns☆56Nov 28, 2021Updated 4 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- A very vulnerable implementation of a GraphQL API.☆61Nov 12, 2021Updated 4 years ago
- An elevated STIX representation of the MITRE ATT&CK Groups knowledge base☆23May 23, 2022Updated 3 years ago
- Power Prompt - Enhance ChatGPT & OpenAi interaction. Seamless conversations. Choose models, save templates, set temp, length & tokens.☆18Feb 15, 2023Updated 3 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆39Sep 29, 2025Updated 5 months ago
- Starting Code for my How to Write Malware 101 Class. This is a Proof of Concept of a C# RAT (Remote Access Trojan) made by Sean Pierce (@…☆21May 29, 2018Updated 7 years ago
- An in-development fork of the Riverloopsec Killerbee Project with additional tools / bugfixes☆11Jan 16, 2018Updated 8 years ago
- Resources for the Customizing Chef book☆11Sep 12, 2014Updated 11 years ago
- Exploiting Android Devices Running Insecure Remote ADB Service☆20Aug 25, 2018Updated 7 years ago
- Plaform independent reverse shell over https☆11Mar 2, 2020Updated 6 years ago
- WptsExtensions.dll for exploiting DLL hijacking of the task scheduler.☆56Jun 30, 2021Updated 4 years ago
- 25 days, 25 languages; my solutions to Advent of Code 2024.☆11Jan 6, 2025Updated last year
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Implementation of a card game in Python 3 for terminal☆10Dec 18, 2025Updated 3 months ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Cumulus is web application weakness monitoring, works with just 3 code lines☆40Jan 27, 2023Updated 3 years ago
- ☆10Dec 31, 2024Updated last year
- Evolution of Discrete data with Reinforcement Learning☆13Dec 8, 2019Updated 6 years ago
- Command Spy is a utility for monitoring the command line arguments of new processes on Windows. Made for CCDC.☆11Jul 30, 2023Updated 2 years ago
- ☆12Feb 23, 2015Updated 11 years ago
- /ˈhäjˌpäj/ "a confused mixture."☆13Mar 5, 2026Updated 2 weeks ago
- ☆12Jul 15, 2022Updated 3 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Depending on the AV/EPP/EDR creating a Taskschedule Job with a default cradle is often flagged☆89Jul 7, 2022Updated 3 years ago
- Webhook endpoint for Fireflies transcripts with intent detection☆20Nov 1, 2024Updated last year
- Harvis is designed to automate your C2 Infrastructure.☆106Jul 10, 2022Updated 3 years ago
- Materials for the NICAR 2017 Data Wrangling with Python hands-on class☆13Mar 4, 2017Updated 9 years ago
- Easy discovery of assets☆13Jun 22, 2022Updated 3 years ago