Learning-Pentesting-With-Python
☆18Sep 26, 2018Updated 7 years ago
Alternatives and similar repositories for Learning-Pentesting-With-Python
Users that are interested in Learning-Pentesting-With-Python are comparing it to the libraries listed below
Sorting:
- Persistent bind shell via pythonic shellcode execution, and registry tampering.☆22Dec 1, 2017Updated 8 years ago
- The Intel 8080 ("eighty-eighty") is the second 8-bit microprocessor designed and manufactured by Intel.☆15May 25, 2022Updated 3 years ago
- Exploiting ring0 memcpy-like functionality to disable Driver Signing Enforcement (DSE)☆20Apr 12, 2020Updated 5 years ago
- A curated list of awesome threat detection and hunting resources☆20Apr 13, 2019Updated 6 years ago
- 0day Windows/x64 Inject All Processes With Meterpreter Reverse Shell Shellcode (655 bytes)☆51Jul 30, 2021Updated 4 years ago
- Defense Intelligence Agency's Special Access Program For Cyber Intelligence, A National Security Asset | Project Red Sword Deploys an AI-…☆21Feb 11, 2025Updated last year
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Host-based local vulnerability scanner. Finds installed software on the host, asks their vulnerabilities to vulmon.com API and print vuln…☆33Aug 1, 2021Updated 4 years ago
- Code Repo with My Solved Exercises From the Udemy Bootcamp☆38Jan 10, 2019Updated 7 years ago
- Side Channel script☆25Mar 1, 2023Updated 3 years ago
- ☆16Jan 5, 2017Updated 9 years ago
- H2HC 2018 Slides/Materials/Presentations☆36Nov 24, 2020Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆16Jun 10, 2019Updated 6 years ago
- Udemy course - Python for Data Science and Machine Learning bootcamp☆11Mar 15, 2017Updated 9 years ago
- The Metasploit Project is a computer security project that provides information about security vulnerabilities and aids in penetration te…☆17Aug 11, 2017Updated 8 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 6 years ago
- This repo contains resources to help learn and understand penetration testing☆15May 9, 2018Updated 7 years ago
- Metasploitable3 is a VM that is built from the ground up with a large amount of security vulnerabilities.☆10Oct 20, 2018Updated 7 years ago
- A Flask Based Web Application which is used to detect the phishing URL's.☆11Nov 27, 2019Updated 6 years ago
- some pentest scripts & tools by yaseng@uauc.net☆149Feb 26, 2020Updated 6 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆47Jan 4, 2018Updated 8 years ago
- SIP hacking tools and scripts☆23Nov 20, 2020Updated 5 years ago
- This is a repository for storing the codes of the Wireless Communications.☆10Jan 8, 2019Updated 7 years ago
- Gopro wifi command hack---a sniff result of Gopro App . The Json file can be used as a Gopro control API. Simply connect to yout Gopro ho…☆15Feb 19, 2016Updated 10 years ago
- Phishing Detection System using Natural Language Processing and Machine Learning☆11Jul 28, 2022Updated 3 years ago
- Secure and performant OCI-image builder for Kubernetes☆12Mar 13, 2026Updated last week
- Some drivers I've written while solving exercises from Practical Reverse Engineering☆15Jan 9, 2022Updated 4 years ago
- Open-source Exploiting Framework☆31Mar 13, 2017Updated 9 years ago
- Bug-Bounty Resources and Articles☆13Sep 16, 2018Updated 7 years ago
- A detailed comparison of performance scores achieved by Machine Learning and Deep Learning algorithms on 3 different Phishing datasets. 3…☆16Sep 17, 2019Updated 6 years ago
- ☆16Nov 11, 2022Updated 3 years ago
- Empire (https://github.com/EmpireProject/Empire) dockerized☆10Sep 17, 2018Updated 7 years ago
- Get your website a professional touch with a free is-cod.in domain!☆14Dec 1, 2025Updated 3 months ago
- Helping my friend with her economics research project by scraping drug information from DarkWeb using selenium and Tor☆18Mar 12, 2020Updated 6 years ago
- A collection of penetration testing tools written in Python 2☆14Sep 16, 2019Updated 6 years ago
- No computer is secure, mate. Brute force SSH really easily.☆15Jan 2, 2022Updated 4 years ago
- Tiny WiFi sniffer with Scapy for MAC OS X☆22Oct 18, 2014Updated 11 years ago
- Some scripts for penetration testing☆30Dec 29, 2018Updated 7 years ago