helviojunior / pyccat
Colored Cat is a syntax highlighter file reader.
☆16Updated 8 months ago
Alternatives and similar repositories for pyccat:
Users that are interested in pyccat are comparing it to the libraries listed below
- burp extension for brazilian stuff☆26Updated last year
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆23Updated 3 months ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 4 months ago
- ☆16Updated last month
- 😛 Primefaces 5.X EL Injection Exploit (CVE-2017-1000486)☆18Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆65Updated last year
- ☆64Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆33Updated last year
- ☆19Updated 10 months ago
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆18Updated 4 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆46Updated 2 years ago
- ☆14Updated last year
- My workflow made with shell script, some API's and tools. ;)☆10Updated 10 months ago
- ☆38Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Automate converting webshells into reverse shells.☆67Updated last week
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- ☆47Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆28Updated 4 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆59Updated 3 months ago
- Manipulating tokens for SeImpersonatePrivilege exploitation using Windows API☆9Updated last year
- ☆16Updated 10 months ago
- Make an Linux Kernel rootkit visible again.☆47Updated 2 weeks ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 8 months ago
- A network logging tool that logs per process activities☆32Updated last year