ARCHIVED: Use 'peh' instead
☆16May 4, 2021Updated 4 years ago
Alternatives and similar repositories for wpe
Users that are interested in wpe are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Post exploitation helper☆37Apr 25, 2023Updated 2 years ago
- A python based semi-automatic buffer overflow exploit script☆16Sep 6, 2020Updated 5 years ago
- ☆32Oct 21, 2023Updated 2 years ago
- Reconnaissance and Enumeration automation script☆53Mar 16, 2021Updated 5 years ago
- ☆12Feb 8, 2021Updated 5 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Exactly what it sounds like, which is something rad☆22Oct 12, 2022Updated 3 years ago
- Shellcode process injector☆28May 22, 2020Updated 5 years ago
- markdown-magic Plugin to list out the contributors of your repository.☆13Jan 16, 2017Updated 9 years ago
- Combined PowerShell and CMD Reverse Shell☆13Oct 31, 2019Updated 6 years ago
- The code implements ransomware-like behavior, encrypting files by changing their extensions to "k3vil." It includes a decryption process …☆19May 23, 2024Updated last year
- Tiny Flask app for testing HTTP calls☆11Aug 7, 2018Updated 7 years ago
- Code for NDSS' 19 paper: A Systematic Framework to Generate Invariants for Anomaly Detection in Industrial Control Systems☆13Jun 21, 2021Updated 4 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- Super Simple Windows Web Server☆47Mar 16, 2023Updated 3 years ago
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- automating the zig release process☆11Nov 19, 2025Updated 4 months ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆44Sep 28, 2020Updated 5 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 2 years ago
- A privacy focused, Chromium browser for web scraping. Built with Tor and PySide6 (a QT framework).☆10Mar 13, 2023Updated 3 years ago
- Windows Enumeration and Privilege Escalation Script☆18Nov 1, 2019Updated 6 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- My personal site, completely run on Cloudflare☆12Aug 31, 2022Updated 3 years ago
- ☆12Oct 10, 2023Updated 2 years ago
- ☆14Nov 18, 2021Updated 4 years ago
- DAta Nudged into GIT - File-based datasets that use git for version control of individual records☆11Mar 1, 2022Updated 4 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- LOCAL ROOT EXPLOITS☆39Jul 30, 2018Updated 7 years ago
- https://codeberg.org/ccxvii/djvudec☆14Aug 13, 2025Updated 7 months ago
- A command line tic-tac-toe game in Golang☆12Oct 14, 2024Updated last year
- Suggests programs to run against services found during the enumeration phase of a Pentest☆116Oct 25, 2025Updated 4 months ago
- ☆14Nov 16, 2024Updated last year
- ☆12Feb 8, 2018Updated 8 years ago
- The files for my Solder Sustainer v2 project! Check it out at www.roboticworx.io!☆15Jan 8, 2025Updated last year
- A framework to kickstart yourself in making malicious USB devices using ATTiny85.☆14Jun 11, 2025Updated 9 months ago
- Scrapes information on vulnerabilities from US-CERT and parses them for further usage☆17Jun 23, 2020Updated 5 years ago
- Post-quantum trusted time-stamping server☆17Dec 11, 2024Updated last year