A fast python tool for creating permutations of alphanumerics
☆11Mar 22, 2020Updated 6 years ago
Alternatives and similar repositories for fast-permute
Users that are interested in fast-permute are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Regex out URI parameters from backend code, craft URIs to check for reflections or send to local burp proxy☆13Dec 8, 2022Updated 3 years ago
- Extracts all base64 ticket data from a rubeus /dump file and converts the tickets to ccache files for easy use with other tools.☆66Oct 3, 2020Updated 5 years ago
- Specialized tool to dump Position Independent Code.☆22Aug 4, 2020Updated 5 years ago
- Platform independent library for interfacing windows security descriptors☆23Jan 2, 2026Updated 2 months ago
- An introductory papercraft spectrometry kit☆18Jul 11, 2020Updated 5 years ago
- Declare and keep up a rogue default-gateway in Cisco's HSRP default configuration☆16May 26, 2017Updated 8 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- A library to parse, modify, and implement Malleable C2 profiles☆27Feb 9, 2019Updated 7 years ago
- A C port of b33f's UrbanBishop☆38Oct 1, 2020Updated 5 years ago
- Xenotix xBOT is a Cross Platform PoC Bot that abuse certain Google Services to implement it's C&C☆27Jun 18, 2018Updated 7 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- Microsoft Flow Attack Framework☆23Nov 14, 2019Updated 6 years ago
- A simple reflective dll example☆19Jan 8, 2017Updated 9 years ago
- Microsoft BASIC for 6502 (Commodore, Apple, KIM-1, AIM-65, OSI, ...)☆13Feb 23, 2025Updated last year
- Convert Empire profiles to Apache mod_rewrite scripts☆29Sep 17, 2019Updated 6 years ago
- A tool which allows an attacker to change the time on a GPS-enabled NTP server by using spoofed NEMA sentences☆26Jun 24, 2017Updated 8 years ago
- Files for http://deniable.org/windows/windows-callbacks☆26Jul 9, 2020Updated 5 years ago
- A binary analysis tool for linux☆71Jun 2, 2020Updated 5 years ago
- Exercises for C# Workshop at Wild West Hackin' Fest 2018 & 2019.☆64Oct 28, 2019Updated 6 years ago
- MMBasic for Windows base on olcPixelGameEngine☆12Nov 2, 2023Updated 2 years ago
- Windows privileges add to the complexity of Windows user permissions. Each additional user added to a group could lead to a domain compro…☆10Mar 2, 2018Updated 8 years ago
- Pay the Pony is hilarityware that uses the Reflective DLL injection library to inject into a remote process, encrypt and demand a ransom …☆28Mar 31, 2014Updated 11 years ago
- The repository accompanying the Buer Emulation workshop☆24Aug 18, 2021Updated 4 years ago
- The new incarnation of the 40 year old Z80 trainer computer - Now with Fulisik LEDs!☆10Feb 24, 2025Updated last year
- ☆14Jan 16, 2023Updated 3 years ago
- Simple header only library to change return address on current stack frame.☆22Sep 4, 2016Updated 9 years ago
- Dangling COM Keys Finder☆17Nov 16, 2021Updated 4 years ago
- pypykats in your browser☆56Sep 28, 2019Updated 6 years ago
- A Raspberry Pico Powered shortcut key display gadget.☆13Mar 22, 2021Updated 5 years ago
- z80 computer bios, schematics and cad files☆13Mar 23, 2021Updated 5 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆57Feb 20, 2020Updated 6 years ago
- My Modular Z80 Homebrew Computer☆12Updated this week
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- An insecurely implemented and installed Windows service for emulating elevation of privileges vulnerabilities☆63Aug 25, 2022Updated 3 years ago
- Cross-Platform Reverse Socks Proxy in Go☆27Feb 25, 2023Updated 3 years ago
- The Network project is a C++ encapsulation of WinSock2 to form a lightweight network library; The Graphics project is a C++ encapsulation…☆13Oct 31, 2017Updated 8 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Process Herpaderping proof of concept, tool, and technical deep dive. Process Herpaderping bypasses security products by obscuring the in…☆20Oct 26, 2020Updated 5 years ago