Python-based tool to dump security information from Windows systems
☆284Jun 22, 2020Updated 5 years ago
Alternatives and similar repositories for pysecdump
Users that are interested in pysecdump are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆78Oct 15, 2019Updated 6 years ago
- Source code files and writeups of the 2018 CFI CTF's challenges.☆51Dec 12, 2018Updated 7 years ago
- Write-ups and Source-codes for CTF Challenges☆71Oct 29, 2024Updated last year
- SQL injection challenge☆112Jan 19, 2017Updated 9 years ago
- Challenges source code☆68Jan 27, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Repository to index useful online tools for CTF☆178Feb 2, 2025Updated last year
- Challenge source and solutions for InCTF junior (exclusively for Indian school students)☆33Sep 27, 2019Updated 6 years ago
- RSA primes numbers /RSA/CTFs☆85May 23, 2023Updated 2 years ago
- CTF Challenges☆142Dec 17, 2024Updated last year
- Challenge source code, handout script and writeups of InCTF National Edition☆95Oct 2, 2019Updated 6 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- swiss army knife for hackers☆549Jul 18, 2023Updated 2 years ago
- Cross-site scripting labs for web application security enthusiasts☆338Jun 2, 2021Updated 4 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- This is a list of security tools that I have used or recommend. Welcome any contributions!☆390Feb 6, 2024Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆207Nov 6, 2023Updated 2 years ago
- Challenge source code, handout scripts and writeups of InCTF International Edition☆165Nov 26, 2023Updated 2 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,498Aug 1, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Automatically exported from code.google.com/p/unix-privesc-check☆1,082Feb 7, 2021Updated 5 years ago
- Reverse shell generator written in Python 3.☆556Aug 6, 2025Updated 9 months ago
- Pwnable|Web Security|Cryptography CTF-style challenges☆436Jun 23, 2023Updated 2 years ago
- ☆17May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/yaptest☆67Feb 25, 2022Updated 4 years ago
- The goal of this repository is to document the most common techniques to bypass AppLocker.☆2,059Sep 11, 2023Updated 2 years ago
- Everything needed for doing CTFs☆789Nov 7, 2023Updated 2 years ago
- A curated list of awesome privilege escalation☆1,555Mar 23, 2026Updated last month
- Advanced dork Search & Mass Exploit Scanner☆1,569Aug 10, 2024Updated last year
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆40May 29, 2015Updated 10 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,225Oct 23, 2022Updated 3 years ago
- Phishing Campaign Toolkit☆2,540May 9, 2026Updated last week
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,269Mar 26, 2026Updated last month
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆647Dec 7, 2022Updated 3 years ago
- CDL Hardware implementations; BBC microcomputer, RISC-V (numerous), frame buffers, JTAG, etc☆17Feb 20, 2020Updated 6 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,463Mar 11, 2026Updated 2 months ago