Swiss Army knife for raw bytes manipulation & interception
☆56Apr 8, 2023Updated 3 years ago
Alternatives and similar repositories for pip3line
Users that are interested in pip3line are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated 802.1x Bypass☆89Mar 11, 2020Updated 6 years ago
- A set of compiled application restriction bypasses☆30Mar 15, 2017Updated 9 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- ☆25May 9, 2021Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Automated Data Model and State Machine Inference of Previously Unobserved Network Protocols☆14Dec 10, 2015Updated 10 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Firework is a proof of concept tool to interact with Microsoft Workplaces creating valid files required for the provisioning process.☆44Aug 7, 2020Updated 5 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Jul 24, 2019Updated 6 years ago
- ☆63Mar 21, 2018Updated 8 years ago
- C# code to run PIC using CreateThread☆17Apr 19, 2019Updated 7 years ago
- ☆14Aug 27, 2025Updated 8 months ago
- Working Rsh Client With Bind/Reverse Shell☆19Sep 15, 2015Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A tool to help you manage your leaks☆35Nov 22, 2017Updated 8 years ago
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆33Oct 7, 2024Updated last year
- ☆83Jan 29, 2016Updated 10 years ago
- Exfiltrate data with ICMP☆102Jan 31, 2018Updated 8 years ago
- ☆163Aug 28, 2015Updated 10 years ago
- WePWNise generates architecture independent VBA code to be used in Office documents or templates and automates bypassing application cont…☆351Aug 27, 2018Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Memory awesomeness.☆29Mar 22, 2015Updated 11 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- ☆13Apr 30, 2016Updated 10 years ago
- ☆22Aug 31, 2016Updated 9 years ago
- A modular distributed penetration testing tool.☆41Dec 21, 2016Updated 9 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Feb 1, 2014Updated 12 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆96Mar 7, 2018Updated 8 years ago
- Get clients and access points.☆49Aug 28, 2019Updated 6 years ago
- Shellcode Encrypter & Decrypter via XOR Cipher☆61Aug 29, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆91May 8, 2018Updated 8 years ago
- LOKI (Limited Obstructive Keyboard Impersonator) is a RDP File Transfer Tool Using Keypresses☆63Mar 11, 2016Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- Dumain Bruteforcer - a fast and flexible domain bruteforcer☆52Sep 19, 2018Updated 7 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago