Scapy hands-on at #GreHack17
☆17Nov 14, 2017Updated 8 years ago
Alternatives and similar repositories for GreHack17_scapy-handson
Users that are interested in GreHack17_scapy-handson are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Jun 21, 2018Updated 7 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13May 2, 2018Updated 7 years ago
- Example of Python Code to manage Tydom (Delta Dore) devices - Need Tydom Gateway☆31Dec 8, 2022Updated 3 years ago
- Under Your Radar (UYR): Exfiltration using Steganography☆18Mar 28, 2015Updated 11 years ago
- A collection of Ansible Playbooks that configure Kali to use Fish & install a number of tools☆164Oct 21, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of VC++ example applications to demonstrate Win10 userland heap behavior (BEA & FEA)☆85Jul 16, 2016Updated 9 years ago
- A (dead-simple) Golang utility allowing you to monitor HTTP endpoints☆38Feb 12, 2023Updated 3 years ago
- PIC code gen and loading☆13Jul 25, 2017Updated 8 years ago
- Sample slash command server for Mattermost (Python)☆14Mar 1, 2016Updated 10 years ago
- ☆14Apr 29, 2019Updated 6 years ago
- Sysmon configuration file templates with advanced event tracing and blocking☆41Apr 7, 2026Updated last week
- ☆77Jun 25, 2019Updated 6 years ago
- Break Apps with Frida workshop material☆46Oct 17, 2017Updated 8 years ago
- Collection of scripts provided for public use☆42Updated this week
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Issues to consider when planning a red team exercise.☆15Aug 22, 2017Updated 8 years ago
- A Natural Language Processing based approach to detect malicious HTTP requests.☆11Oct 2, 2020Updated 5 years ago
- "GitOps" repo for Cloud Native Nordics k8s environment☆13Nov 27, 2021Updated 4 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆20Sep 8, 2017Updated 8 years ago
- Make Windows LNK file with python (pylnk)☆64Jun 4, 2016Updated 9 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- PowerShell script utilized to pull several forensic artifacts from a live Win7 and WinXP system without WINRM.☆52Jan 25, 2018Updated 8 years ago
- ☆22Aug 11, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- redpwn's challenge deployment system☆29Dec 22, 2023Updated 2 years ago
- A little 2D environment to visualize "learn by example" technique☆11Feb 20, 2019Updated 7 years ago
- Customize your linux shell with one command line!☆13Oct 15, 2024Updated last year
- The full story of the CLR implementation of Meterpreter☆153Jul 29, 2020Updated 5 years ago
- ☆28Apr 3, 2018Updated 8 years ago
- What makes a password survive until the final 15% of hashes still left standing? Join us on the cracking equivalent of an archeological …☆14Feb 19, 2019Updated 7 years ago
- Boilerplate for Kubernetes Kind☆12Apr 24, 2020Updated 5 years ago
- ☆69Feb 12, 2026Updated 2 months ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆68Aug 1, 2017Updated 8 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆19Apr 12, 2020Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Python Certificate Transparency client☆11Feb 8, 2015Updated 11 years ago
- Hugo repository for main ironpeak.be website.☆12Feb 17, 2026Updated last month
- Example Material for SecureState's 2016 Python for Pentesters Webinar☆10Dec 13, 2016Updated 9 years ago