Learning-Pentesting-With-Python
☆18Sep 26, 2018Updated 7 years ago
Alternatives and similar repositories for Learning-Pentesting-With-Python
Users that are interested in Learning-Pentesting-With-Python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- From this app, Connect a Phone, Extract any app from It, Decompile, Deobfuscate, Remove Certificate Pinning and Repackage it. Meanwhile, …☆27Sep 26, 2025Updated 7 months ago
- Generate customized and undetectable exploits for Metasploit.☆22Jul 10, 2017Updated 8 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Golang tool to scan hosts for SMB version and signing status☆15Nov 19, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 7 years ago
- This project provides a web interface to send a payload via SMS, display device information upon successful delivery, and control the dev…☆23Mar 26, 2026Updated last month
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆50Jul 30, 2021Updated 4 years ago
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆22Feb 11, 2025Updated last year
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- ☆35Feb 9, 2018Updated 8 years ago
- Just another collection of links, tools, reports and other stuff☆24Jun 22, 2021Updated 4 years ago
- Static site generator for http://asm.thi.ng☆10Mar 26, 2016Updated 10 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Side Channel script☆25Mar 1, 2023Updated 3 years ago
- A series of Bro Scripts created for detection purposes.☆19Nov 18, 2016Updated 9 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- cidrgen is based on cidr's subnet IP list generator☆15Aug 21, 2020Updated 5 years ago
- An evolving how-to guide for securing a Linux server.☆15Apr 12, 2019Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration te…☆17Aug 11, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- some pentest scripts & tools by yaseng@uauc.net☆150Feb 26, 2020Updated 6 years ago
- The Social-Engineer Toolkit (SET) repository from TrustedSec - All new versions of SET will be deployed here.☆14Feb 15, 2026Updated 2 months ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- Secure and performant OCI-image builder for Kubernetes☆12Updated this week
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆15Oct 26, 2017Updated 8 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- Minimal Docker image with Nmap Network Security Scanner pre-installed.☆12Dec 5, 2025Updated 4 months ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago