Python-based tool to dump security information from Windows systems
☆281Jun 22, 2020Updated 5 years ago
Alternatives and similar repositories for pysecdump
Users that are interested in pysecdump are comparing it to the libraries listed below
Sorting:
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆77Oct 15, 2019Updated 6 years ago
- Source code files and writeups of the 2018 CFI CTF's challenges.☆51Dec 12, 2018Updated 7 years ago
- Write-ups and Source-codes for CTF Challenges☆70Oct 29, 2024Updated last year
- Challenges source code☆67Jan 27, 2018Updated 8 years ago
- SQL injection challenge☆110Jan 19, 2017Updated 9 years ago
- Repository to index useful online tools for CTF☆174Feb 2, 2025Updated last year
- Challenge source and solutions for InCTF junior (exclusively for Indian school students)☆33Sep 27, 2019Updated 6 years ago
- RSA primes numbers /RSA/CTFs☆84May 23, 2023Updated 2 years ago
- CTF Challenges☆140Dec 17, 2024Updated last year
- Challenge source code, handout script and writeups of InCTF National Edition☆95Oct 2, 2019Updated 6 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- This tool reads the output of “showrev -p” on Solaris machines and outputs a list of exploits that you might want to try. It currently f…☆30May 29, 2015Updated 10 years ago
- swiss army knife for hackers☆544Jul 18, 2023Updated 2 years ago
- Cross-site scripting labs for web application security enthusiasts☆334Jun 2, 2021Updated 4 years ago
- Tool for performing lots of DNS queries quickly☆18May 29, 2015Updated 10 years ago
- This is a list of security tools that I have used or recommend. Welcome any contributions!☆383Feb 6, 2024Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆206Nov 6, 2023Updated 2 years ago
- Challenge source code, handout scripts and writeups of InCTF International Edition☆164Nov 26, 2023Updated 2 years ago
- Tool to help identify timing attacks☆70Sep 4, 2011Updated 14 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Dec 21, 2015Updated 10 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems☆1,504Aug 1, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/unix-privesc-check☆1,084Feb 7, 2021Updated 5 years ago
- Reverse shell generator written in Python 3.☆548Aug 6, 2025Updated 7 months ago
- Pwnable|Web Security|Cryptography CTF-style challenges☆433Jun 23, 2023Updated 2 years ago
- ☆17May 29, 2015Updated 10 years ago
- Automatically exported from code.google.com/p/yaptest☆66Feb 25, 2022Updated 4 years ago
- The goal of this repository is to document the most common techniques to bypass AppLocker.☆2,055Sep 11, 2023Updated 2 years ago
- A curated list of awesome privilege escalation☆1,520Aug 20, 2025Updated 6 months ago
- Everything needed for doing CTFs☆784Nov 7, 2023Updated 2 years ago
- Advanced dork Search & Mass Exploit Scanner☆1,558Aug 10, 2024Updated last year
- ☆40May 29, 2015Updated 10 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them sort Vulnhub Labs. This list contains all the writeups available on…☆1,206Oct 23, 2022Updated 3 years ago
- Phishing Campaign Toolkit☆2,522Jul 29, 2025Updated 7 months ago
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,252Jun 10, 2025Updated 9 months ago
- A tool to analyze the network flow during attack/defence Capture the Flag competitions☆638Dec 7, 2022Updated 3 years ago
- CDL Hardware implementations; BBC microcomputer, RISC-V (numerous), frame buffers, JTAG, etc☆17Feb 20, 2020Updated 6 years ago
- A tool designed to exploit a privilege escalation vulnerability in the sudo program on Unix-like systems. It takes advantage of a specifi…☆2,447Mar 11, 2026Updated last week