Information for accessing The Cyber Plumber's Handbook Lab
☆31Oct 10, 2022Updated 3 years ago
Alternatives and similar repositories for cyber_plumbers_handbook_lab_info
Users that are interested in cyber_plumbers_handbook_lab_info are comparing it to the libraries listed below
Sorting:
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- XOrCryptEx lightweight C Utility/Algorithm☆11Mar 3, 2022Updated 4 years ago
- Emacs: Apply all (!) .dir-locals.el from root to current directory☆11Oct 13, 2021Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- A malicious keyboard that delivers a multi-staged attack, consisting of a trojan payload which can bypass antivirus, with Windows machine…☆17Mar 23, 2025Updated 11 months ago
- python_dark_web☆28May 7, 2019Updated 6 years ago
- ☆12Mar 27, 2024Updated last year
- Collection of red machine learning projects☆41Aug 16, 2021Updated 4 years ago
- Repository contains shellcodes made from scratch for intel x86-64 bit Architecture☆12May 6, 2023Updated 2 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- Example project showing how to interface C/C++ arrays and classes with Numpy using SWIG☆18Feb 12, 2018Updated 8 years ago
- FUD MSFVenom Payload Gen. CatchYou 2 is a fork from CatchYou by TheLinuxChoice.☆12Aug 2, 2020Updated 5 years ago
- My personally curated list of bash/command-line commands and snippets that are very useful yet I keep on forgetting☆19Jun 8, 2022Updated 3 years ago
- Official Malice Plugins☆21Nov 26, 2018Updated 7 years ago
- An offensive security framework for writing payloads☆18Sep 13, 2022Updated 3 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- LSTAR - CobaltStrike Translated to EN☆22Jun 15, 2023Updated 2 years ago
- Scripts for OSCE☆18Dec 28, 2018Updated 7 years ago
- Step-by-step documentation on how to decrypt SCCM database secrets offline☆50Oct 20, 2025Updated 4 months ago
- This project provides Base64 encoding and decoding functionality to PowerShell within Constrained Language Mode☆27Jun 25, 2024Updated last year
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- Another AMSI bypass - but in C++.☆25May 22, 2023Updated 2 years ago
- ☆34Nov 11, 2025Updated 3 months ago
- Reverse engineered API for Microsoft's Time Travel Debugger☆36Apr 18, 2024Updated last year
- Metasploit automation. Why work when a minion can do it?☆21May 9, 2017Updated 8 years ago
- Citrix Phishlet☆24Feb 2, 2021Updated 5 years ago
- Useful commands for infosec☆29Feb 13, 2023Updated 3 years ago
- My BloodHound custom queries☆26Jan 10, 2023Updated 3 years ago
- AMSI detection PoC☆31Apr 14, 2020Updated 5 years ago
- AMSI Bypass for powershell☆30Apr 26, 2022Updated 3 years ago
- whoareyou is a tool to find the underlying technology/software used in a list of websites passed through stdin (using Wappalyzer dataset)☆32Jun 15, 2020Updated 5 years ago
- Resolve WinAPI func. Custom GetProcAddress and GetModuleHandle written in Nim☆32Jun 2, 2021Updated 4 years ago
- Carves EXEs from given data files, using intelligent carving based upon PE headers☆38May 2, 2017Updated 8 years ago
- Use md5-collisions to make evil executables looking like a good one.☆34Apr 23, 2020Updated 5 years ago
- 💫 the elite game site for those who are against the generic games found on other sites of a similar nature.☆13Sep 5, 2025Updated 6 months ago
- ☆10Apr 20, 2022Updated 3 years ago
- Some simple scripts that I use during bug bounty hunting in Android Apps☆28Jan 30, 2025Updated last year
- Right-To-Left Override POC☆36Mar 21, 2022Updated 3 years ago
- ☆34Jan 22, 2025Updated last year