A Python version of PadBuster.pl by Gotham Digital Security (GDSSecurity on Github)
☆24May 1, 2012Updated 13 years ago
Alternatives and similar repositories for pypadbuster
Users that are interested in pypadbuster are comparing it to the libraries listed below
Sorting:
- ☆12Aug 29, 2025Updated 6 months ago
- Qubes OS architecture diagrams for use in articles, posts and docs☆19Oct 3, 2017Updated 8 years ago
- Making shellcode UD - https://osandamalith.com☆25Jul 31, 2016Updated 9 years ago
- .net tool that uses WMI queries to enumerate active sessions and accounts configured to run services on remote systems☆36Dec 9, 2019Updated 6 years ago
- Study and research with your docs, media, and AI in one place☆33Mar 2, 2026Updated last week
- some java code i met or i used☆29May 7, 2019Updated 6 years ago
- ☆13Nov 5, 2024Updated last year
- Dumping credentials through windbg and pykd☆41Sep 25, 2023Updated 2 years ago
- ☆13Aug 19, 2015Updated 10 years ago
- First edition of the annual beginner CTF by havce.☆13Dec 18, 2022Updated 3 years ago
- Extract username and passwords from IPTV urls☆12Nov 8, 2025Updated 4 months ago
- POC MS15-034☆33Apr 28, 2015Updated 10 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- ☆16May 13, 2021Updated 4 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Dec 12, 2018Updated 7 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- Repository of constants used in TLS and X509 parsing☆13May 31, 2022Updated 3 years ago
- CVE-2018-6546-Exploit☆41Apr 15, 2018Updated 7 years ago
- ☆10Apr 4, 2019Updated 6 years ago
- A custom run space to bypass AMSI and Constrained Language mode in PowerShell.☆21May 17, 2023Updated 2 years ago
- Makes drivers less sucky to manage from usermode.☆11Aug 5, 2016Updated 9 years ago
- Assorted, MIT licensed, threat hunting rules from @bradleyjkemp☆14Mar 11, 2022Updated 3 years ago
- Environment for CVE-2018-1273 (Spring Data Commons)☆10Aug 15, 2018Updated 7 years ago
- Clojure library that abstracts libsodium's NaCl primitives (curve25519, ed25519, blake2b, box/unbox, sign/verify, etc.)☆10Jul 4, 2016Updated 9 years ago
- AI-Powered RSS Content Filter - Automatically remove ads, sponsored content, and low-quality articles from your FreshRSS feeds using LLM …☆27Nov 1, 2025Updated 4 months ago
- ☆12Aug 12, 2016Updated 9 years ago
- HTTP host monitoring and management through DNS☆10Aug 31, 2021Updated 4 years ago
- Simple read/write and commentable config files for go☆11Jul 2, 2016Updated 9 years ago
- What Would Portland Do? Generative agent experience☆13Mar 13, 2024Updated last year
- Attempts to brute force the password of a zip file☆10May 31, 2016Updated 9 years ago
- ☆11May 2, 2022Updated 3 years ago
- An ARP based Operating System version scanner☆14Jan 21, 2013Updated 13 years ago
- p7zip with hfs symlink support☆10Jul 18, 2015Updated 10 years ago
- 蜜罐捕获的数据☆11May 16, 2016Updated 9 years ago
- BGP FLowspec automation demo with PyEZ☆14Oct 2, 2018Updated 7 years ago
- Correlate NVD datasets wIth CWE/CAPEC/CVSS labels for customised usage. Plus static analysis and data visualisation.☆13Nov 17, 2023Updated 2 years ago
- Augeas-based grub type and providers☆10Updated this week
- NativePayload_TiACBT (Remote Thread Injection + C# Async Method + CallBack Functions Technique)☆13Jun 6, 2023Updated 2 years ago