Information for accessing The Cyber Plumber's Handbook Lab
☆30Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for cyber_plumbers_handbook_lab_info
Users that are interested in cyber_plumbers_handbook_lab_info are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Python API client for interacting with the Gumroad API☆18Oct 1, 2025Updated 7 months ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆13Mar 3, 2022Updated 4 years ago
- ☆20Jun 25, 2019Updated 6 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Aug 2, 2020Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- 📡 Ease file sharing during pentest/CTF 🎸☆11Apr 20, 2026Updated 2 weeks ago
- A Binary Ninja plugin for WebAssembly.☆15Jun 30, 2020Updated 5 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 8 years ago
- Collection of useful Ghidra utilities and references☆14Apr 9, 2024Updated 2 years ago
- Collection of red machine learning projects☆42Aug 16, 2021Updated 4 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated last year
- A pure python implementation of the Snappy compression algorithm.☆18Sep 29, 2021Updated 4 years ago
- ☆35Nov 11, 2025Updated 5 months ago
- Gathers machine learning and deep learning models for Stock forecasting including trading bots and simulations☆10Apr 18, 2022Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- CLI tool to compute the TypeRefHash for .NET binaries.☆19Nov 10, 2021Updated 4 years ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- The Convergence Admin Console☆14Mar 7, 2023Updated 3 years ago
- a exec jsp shell, simply like weevely php C/S shell.☆15Jun 21, 2022Updated 3 years ago
- Brutteforce for stego CTFs☆17Nov 2, 2022Updated 3 years ago
- Python libraries for extracting Sentinel-2's metadata from Amazon S3☆12Oct 22, 2019Updated 6 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆23Feb 4, 2018Updated 8 years ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 6 months ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago
- Ransomware Simulator for testing Blue Team Detections☆37Jun 5, 2022Updated 3 years ago
- minimal library for image super-resolution implemented in jax☆13Jul 12, 2021Updated 4 years ago
- intelligent and automatic build system for C☆15Apr 17, 2021Updated 5 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- ☆11Dec 13, 2021Updated 4 years ago
- suricata rules to pcap☆10Mar 25, 2021Updated 5 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- KrbRelayUp - a universal no-fix local privilege escalation in windows domain environments where LDAP signing is not enforced (the default…☆14Jul 29, 2022Updated 3 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Detect strange memory regions and DLLs☆191Jan 20, 2022Updated 4 years ago
- encrypted-linux-kernel-modules☆12Nov 4, 2020Updated 5 years ago
- Nim Library for Offensive Security Development☆201Sep 4, 2023Updated 2 years ago
- 📄 [Talk] OFFZONE 2022 / ODS Data Halloween 2022: Black-box attacks on ML models + with use of open-source tools☆14May 23, 2023Updated 2 years ago
- Base64 Mutator☆13Feb 13, 2021Updated 5 years ago