greyshell / python_programming
Learning Python
☆9Updated 2 months ago
Alternatives and similar repositories for python_programming:
Users that are interested in python_programming are comparing it to the libraries listed below
- Automate SSH communication with firewalls, switches, etc.☆26Updated 6 years ago
- ☆46Updated 7 years ago
- Invoke remote powershell scripts in memory of compromised hosts.☆10Updated 10 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Projects and POCs☆60Updated 10 years ago
- Various pentest scripts☆13Updated 11 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- Repository for proxenet plugins☆14Updated 8 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- ☆20Updated last year
- A set of compiled application restriction bypasses☆29Updated 8 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Updated 8 years ago
- Some of my Nmap scripts☆21Updated 7 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Go command line app to exploit file upload vulnerability☆12Updated 8 years ago
- ☆13Updated 2 years ago
- Scan web server for known webshell names and responses☆50Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Python crawler for remote Windows shares☆12Updated 9 years ago
- Educational Python penetration testing framework☆10Updated 7 years ago
- An AV evasion technique using multibyte xor encoding of shellcode☆8Updated 8 years ago
- Search the ExploitDB with a little more control☆21Updated 7 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- Check privileges, settings and other information on Linux systems and suggest exploits based on kernel versions☆25Updated 7 years ago
- PoC Linux backdoor program to allow the "remote" use of terminal from client to the compromised machine.☆6Updated 9 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆13Updated 11 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago