Colored Cat is a syntax highlighter file reader.
☆15Jun 21, 2024Updated last year
Alternatives and similar repositories for pyccat
Users that are interested in pyccat are comparing it to the libraries listed below
Sorting:
- ☆19Jun 19, 2025Updated 8 months ago
- Articles, White Papers, Technical Write-Ups and more authored by members of the GreySec community. Curated by staff, selected for excelle…☆27Aug 17, 2021Updated 4 years ago
- burp extension for brazilian stuff☆28Sep 8, 2023Updated 2 years ago
- File Crawler index files and search hard-coded credentials☆36Feb 8, 2025Updated last year
- Mobus write and read applications, standalone.☆10Jun 27, 2025Updated 8 months ago
- KnowsMore is a swiss army knife tool for pentesting Microsoft Active Directory (NTLM Hashes, BloodHound, NTDS and DCSync).☆266Dec 15, 2025Updated 2 months ago
- ☆42Dec 1, 2023Updated 2 years ago
- Python Visual Hash, generate a visual random image associated with a string.☆11Apr 23, 2017Updated 8 years ago
- ELT write-ups repository.☆40Jan 31, 2023Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆48Jul 28, 2025Updated 7 months ago
- Conti V3 source code updated☆11Jun 30, 2022Updated 3 years ago
- ☆11Jun 8, 2022Updated 3 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Apr 24, 2024Updated last year
- ☆18Aug 15, 2025Updated 6 months ago
- Automation with SSH for Hacking☆10Jan 28, 2025Updated last year
- Python package for creating visual hashes of data.☆12Apr 20, 2015Updated 10 years ago
- quick script for mixing wordlists in a way that maintains order. ([1,2],[3,4],[5,6] -> [1,3,5,2,4,6])☆10Mar 6, 2022Updated 3 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Network Security Monitoring Console☆22Feb 3, 2010Updated 16 years ago
- Polymorphic Virus in Python☆10Feb 8, 2023Updated 3 years ago
- Brute force para senhas linux☆46Jan 11, 2023Updated 3 years ago
- ☆15Jun 15, 2021Updated 4 years ago
- Yu Gi Oh System Made with Unity and C#☆12Jul 29, 2019Updated 6 years ago
- Using Dutie with Mineflayer = Awesome☆12Apr 7, 2015Updated 10 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Spacedrum instrument playable in browser☆27Nov 23, 2023Updated 2 years ago
- A box containing all you need to get started with our Pet Shop tutorial.☆11Mar 2, 2018Updated 8 years ago
- pagodo (Passive Google Dork) - Automate Google Hacking Database scraping and searching☆12Jun 4, 2022Updated 3 years ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- CVE-2023-33381: OS command injection on MitraStar GPT-2741GNAC☆13Jun 1, 2023Updated 2 years ago
- Misery Loader to bypass modern EDR solutions☆15Dec 20, 2024Updated last year
- ☆15Nov 25, 2023Updated 2 years ago
- 🥦 send and receive nano with 2 simple functions☆11Jun 9, 2021Updated 4 years ago
- Post-CTF writeups☆12Oct 28, 2016Updated 9 years ago
- Send messages or files between devices using an encrypted audio transfer.☆14Apr 23, 2024Updated last year
- Random stuff I write for no specific reason.☆48Feb 24, 2026Updated last week
- Used to do complete Steganography analysis of an image. This tool will help the user to detect any hidden text or message in the image an…☆11Jan 2, 2019Updated 7 years ago