int0x80 / tcispyView external linksLinks
Pull author and committer names and emails from Travis-CI
☆11Aug 9, 2020Updated 5 years ago
Alternatives and similar repositories for tcispy
Users that are interested in tcispy are comparing it to the libraries listed below
Sorting:
- Loot email addresses from commit entries☆56Aug 24, 2022Updated 3 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- IP Address Listing Tool☆12Sep 1, 2013Updated 12 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Aug 2, 2019Updated 6 years ago
- Repository for the Deprecated MITRE Capture the Flag scoreboard.☆11Sep 25, 2017Updated 8 years ago
- Internet Radio based on the Beaglebone Black platform☆15Mar 4, 2016Updated 9 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Simple script to automated the capture and merging process when using a hardware TAP☆15Mar 7, 2013Updated 12 years ago
- Docker Automated Build for Security Testing Tools☆14Apr 8, 2022Updated 3 years ago
- CHEF cookbook for automating provisioning of CTF competition and wargame challenge platforms☆12Jan 5, 2016Updated 10 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 7 years ago
- A cookbook for managing the local security policy on a Windows system☆13Apr 13, 2021Updated 4 years ago
- 🛡 Monitor, analyze, & report security misconfigurations across environments.☆18Oct 26, 2017Updated 8 years ago
- Small modification version of p0wnedShell☆40Apr 25, 2016Updated 9 years ago
- XSS payload designed to steal LastPass users' credentials☆16Apr 25, 2014Updated 11 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- Metasploit Exploit Module for the Android addJavascriptInterface Issue (MITM)☆36Jan 15, 2015Updated 11 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆17Apr 13, 2015Updated 10 years ago
- Example queries for joern☆18Feb 2, 2017Updated 9 years ago
- REST API test utility☆22Oct 31, 2019Updated 6 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- All related files and slides for past talks☆44Dec 14, 2025Updated last month
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 10 years ago
- Created by Jeffrey Martin via the GitHub Connector☆50Feb 13, 2025Updated last year
- ☆21May 20, 2016Updated 9 years ago
- Vulnerable Grails application☆43Jun 12, 2015Updated 10 years ago
- A tiny hacking framework for the PwnAdventure3: Pwnie Island game created by http://ghostintheshellcode.com/ ( http://pwnadventure.com/ )☆26Jan 29, 2015Updated 11 years ago
- UAC 0Day all day!☆57Aug 15, 2017Updated 8 years ago
- Because I can't find scripts to do this anywhere else...☆26Dec 27, 2016Updated 9 years ago
- Speeds up the extraction of password hashes from ntds.dit files. For use with the ntdsxtract project or the dshash script☆27Feb 1, 2024Updated 2 years ago
- Rex library for various exploitation helpers☆21Sep 24, 2025Updated 4 months ago
- Simple Bash script to retrieve basic system information.☆30Apr 14, 2018Updated 7 years ago
- An automated firmware analysis tool based on Firmadyne (https://github.com/firmadyne/firmadyne)☆24Jul 8, 2017Updated 8 years ago
- OG Atomic Red Team☆29Jun 12, 2018Updated 7 years ago
- A plugin that provides resources for beginners to learn reverse engineering using Binary Ninja. It automatically installs several other p…☆26Aug 22, 2017Updated 8 years ago
- Damn Vulnerable Node Application☆20Dec 22, 2015Updated 10 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago