It is a simple python socket-based chat application where communication established between a single server and client.
☆19Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for python-chat-application
Users that are interested in python-chat-application are comparing it to the libraries listed below
Sorting:
- Precompiled binaries for various projects☆13Nov 6, 2020Updated 5 years ago
- ☆17Apr 5, 2021Updated 4 years ago
- Various implementations for C# in memory execution. Assembly.Load() Assembly.LoadFile() AppDomain.ExecuteAssembly()☆34Feb 10, 2021Updated 5 years ago
- Library of sites for categorization☆28Feb 12, 2019Updated 7 years ago
- ☆14Sep 25, 2022Updated 3 years ago
- A very simple python script to encode and decode PowerShell one-liners.☆25Feb 13, 2022Updated 4 years ago
- All binaries, tools,wordlists and tutorials you need to pass eCPPTv2 - For Free!☆26Jan 28, 2023Updated 3 years ago
- WorldFirst (Public) Docker API Exploit - My security researches involving Docker and Openshift☆33Nov 23, 2021Updated 4 years ago
- Install ClickOnce without prompting the user or showing anything☆52Dec 19, 2023Updated 2 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 6 months ago
- ☆43Oct 28, 2021Updated 4 years ago
- Examples for Gophish templates.☆16May 19, 2023Updated 2 years ago
- ☆15Mar 27, 2019Updated 6 years ago
- This repo explains in details about buffer overflow exploit development for windows executable.☆51Sep 21, 2023Updated 2 years ago
- WiFi hacking Lab. Virtualized WiFi pentesting laboratory without the need for physical WiFi cards, using mac80211_hwsim and vwifi proyect…☆62Sep 27, 2023Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12May 11, 2023Updated 2 years ago
- A pretty fast UDP port scanner☆14Feb 10, 2025Updated last year
- Virtual machines and scripts to attack WPA2-Enterprise networks through Rogue Access Points downgrading the authentication method to GTC☆63May 29, 2023Updated 2 years ago
- A Precise and General Dynamic Deobfuscation Method for PowerShell Scripts☆20Mar 30, 2025Updated 11 months ago
- CVE-2023-26818 Exploit MacOS TCC Bypass W/ Telegram☆17Jun 6, 2024Updated last year
- Python script that takes new output from Get-DomainTrustMapping .csvs and outputs graphml. Based on DomainTrustExplorer.☆103Dec 7, 2023Updated 2 years ago
- Custom Google search engine dedicated to IT security & hacking stuff. Over 240 high-quality sources.☆85Jan 15, 2026Updated 2 months ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Simple .NET loader for loading and executing Powershell payloads☆17Nov 5, 2021Updated 4 years ago
- This is a C# implementation of making a process/executable run as NT AUTHORITY/SYSTEM. This is achieved through parent ID spoofing of alm…☆109Feb 14, 2023Updated 3 years ago
- Mishky's AD Range & The Escalation Path from Hell, version 1.1☆18Feb 5, 2026Updated last month
- This is a repository containing code to generate a PowerShell payload to access PCs remotely. For more information check this out 👇👇👇☆16Mar 17, 2022Updated 4 years ago
- ConvGQR: Generative Query Reformulation for Conversational Search. A codebase for ACL 2023 accepted paper.☆34Mar 5, 2024Updated 2 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- Code & data accompanying the IJCAI 2020 paper "GraphFlow: Exploiting Conversation Flow with Graph Neural Networks for Conversational Mach…☆38Jun 21, 2022Updated 3 years ago
- ☆23Apr 23, 2024Updated last year
- Just some random Red Team Scripts that can be useful☆153Jun 28, 2024Updated last year
- [ACL 2022] Ditch the Gold Standard: Re-evaluating Conversational Question Answering☆44Jun 18, 2022Updated 3 years ago
- Check if MS-RPRN is remotely available with powershell/c#☆179Oct 21, 2018Updated 7 years ago
- linikatz is a tool to attack AD on UNIX☆156Oct 19, 2023Updated 2 years ago
- This code bypass AMSI by setting JE instruction to JNE in assembly of amsi.dll file☆37Mar 10, 2023Updated 3 years ago
- Code repo for SIGIR 2021 paper "Few-Shot Conversational Dense Retrieval"☆42Dec 9, 2021Updated 4 years ago
- Penetration testing with shellcode codes☆28Jan 25, 2018Updated 8 years ago
- Tunneling and Port Forwarding Cheat Sheet☆164Apr 12, 2023Updated 2 years ago