Violent Python scripts used in book and few other required files
☆66Oct 21, 2018Updated 7 years ago
Alternatives and similar repositories for Violent-Python-Companion-Files
Users that are interested in Violent-Python-Companion-Files are comparing it to the libraries listed below
Sorting:
- ☆28Apr 9, 2020Updated 5 years ago
- List of advanced XSS payloads☆86Aug 23, 2016Updated 9 years ago
- ☆81May 4, 2020Updated 5 years ago
- Same Pentest Resume☆143Mar 12, 2020Updated 5 years ago
- ☆11Jan 7, 2022Updated 4 years ago
- FAQ Guide for Practical Ethical Hacking Udemy Course☆189Apr 26, 2020Updated 5 years ago
- Sample pentest report provided by TCM Security☆1,330Mar 18, 2022Updated 3 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆23Jan 23, 2023Updated 3 years ago
- A tool for parsing breached passwords☆2,091Mar 21, 2024Updated last year
- Roblox-Xeno is a custom game server for the popular online gaming platform Roblox, offering enhanced gameplay features and exclusive cont…☆21Feb 19, 2026Updated last week
- Notes for Beginner Network Pentesting Course☆6,206Sep 21, 2022Updated 3 years ago
- Simple script to generate commands to achieve reverse shells.☆12Aug 12, 2019Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Scan git repos for secrets using regex and entropy 🔑☆10Jun 18, 2020Updated 5 years ago
- Collection of override files for DockSTARTer☆10Jul 28, 2019Updated 6 years ago
- MISP sighting server is a fast sighting server to store and look-up sightings on attributes (network indicators, file hashes, system indi…☆15Dec 24, 2023Updated 2 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Extract Windows Wi-Fi Passwords to Remote URL☆279Aug 12, 2022Updated 3 years ago
- ☆29Jan 15, 2024Updated 2 years ago
- Script that install a full seedbox using docker and docker-compose☆16Oct 14, 2018Updated 7 years ago
- eCPPTv2 Notes☆13Jun 13, 2021Updated 4 years ago
- This repo contains workshop material delivered at #nullcon2020☆16Mar 6, 2020Updated 5 years ago
- Internal Network Penetration Test Playbook☆17Apr 18, 2022Updated 3 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆62Mar 9, 2019Updated 6 years ago
- GUI for building token grabbers in Python☆26May 14, 2021Updated 4 years ago
- Spotify Email Valid Checker Proxyless (No Proxies Needed) V2 By ARON-TN☆12Feb 21, 2023Updated 3 years ago
- Python proxy scraper module, only returns valid proxies whose timeout is less than 10 seconds.☆13Sep 4, 2021Updated 4 years ago
- A web crawler oriented to infosec.☆23Jan 2, 2024Updated 2 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Jul 11, 2019Updated 6 years ago
- Random things for my own reference☆22Aug 22, 2022Updated 3 years ago
- Chrome Credential Stealer that reports to Discord through Webhooks☆39Mar 11, 2022Updated 3 years ago
- Falcon Integration Gateway (FIG)☆23Feb 24, 2026Updated last week
- ☆21Oct 24, 2018Updated 7 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23May 31, 2020Updated 5 years ago
- List of API's for gathering information about phone numbers, addresses, domains etc☆23Aug 2, 2023Updated 2 years ago