☆331Sep 30, 2020Updated 5 years ago
Alternatives and similar repositories for Violent-Python-Examples
Users that are interested in Violent-Python-Examples are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- collection of python tools☆77Aug 7, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- A collection of PowerShell Modules for BloodHound/Empire Orchestration☆110Sep 26, 2017Updated 8 years ago
- PHDAYS |||☆17May 23, 2013Updated 12 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Feb 16, 2018Updated 8 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- ☆23Apr 8, 2015Updated 11 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆291May 14, 2019Updated 6 years ago
- hacklib - pentesting, port scanning, and logging in anywhere with Python☆100Aug 26, 2019Updated 6 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Custom Queries, Dashboards, and HIPs Rules☆10Jan 13, 2018Updated 8 years ago
- Docker container for OpenVAS8☆12Nov 2, 2015Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 9 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Oct 7, 2013Updated 12 years ago
- Offsec PWB Lab Tools☆13Nov 14, 2013Updated 12 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Experiments in trying to find 0-days in numpy☆38Jul 1, 2017Updated 8 years ago
- ☆424Aug 29, 2017Updated 8 years ago
- Framework for static and dynamic analysis in Android APKs☆32Jul 25, 2017Updated 8 years ago
- PowerShell Empire Web Interface☆330May 20, 2023Updated 2 years ago
- USB Rubber Ducky Wiki☆12Jan 18, 2019Updated 7 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- ultrafast single TCP packet audio/visual experience☆27Jul 16, 2017Updated 8 years ago
- Real world and CTFs exploiting web/binary POCs.☆79Jul 5, 2020Updated 5 years ago
- Powershell VNC injector☆342Jun 29, 2020Updated 5 years ago
- Powershell collection designed to assist in Threat Hunting Windows systems.☆27Apr 13, 2018Updated 8 years ago
- Python script to find subdomains☆11Aug 22, 2025Updated 7 months ago
- A minimal Java client for the Nessus XML RPC interface☆23Apr 1, 2017Updated 9 years ago
- Various penetration testing tools written in Python. Based mostly on ideas and implementations presented in 'Violent Python: A Cookbook f…☆70Nov 6, 2016Updated 9 years ago
- ☆285Sep 19, 2014Updated 11 years ago
- Python tool to check for expired domains still allowed in crossdomain.xml files☆13Jan 11, 2017Updated 9 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Framework for Making Environmental Keyed Payloads (NO LONGER SUPPORTED)☆763Jan 28, 2019Updated 7 years ago
- Awesome SmartBear Apps, Tools, Repos, Packages, and Resources 🐻☆19Jan 11, 2024Updated 2 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆107Jul 2, 2017Updated 8 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago