A community package-based python wrapper that simplifies carrying out scans, and pentests upon certain scope while performing security penetration testing and researches.
☆11Dec 10, 2023Updated 2 years ago
Alternatives and similar repositories for Artemis
Users that are interested in Artemis are comparing it to the libraries listed below
Sorting:
- This is IPFS web3.storage unofficial library written in python. I have made it simple and easier to integrate with web3.storage API using…☆14Oct 27, 2023Updated 2 years ago
- An automated penetration testing tool , that automates web vulnerabilities testing upon a given URL with an endpoint parameter☆24May 19, 2024Updated last year
- A curation of awesome security tools, exploits security projects developed by Tanzanian Cybersecurity Enthusiasts☆13Apr 14, 2024Updated last year
- An automated script to extract hidden images from Tecno Camon X☆12Sep 23, 2023Updated 2 years ago
- cyber security notes for your consumption.☆14Jul 30, 2024Updated last year
- Easy encrypt/decrypt data with TPM☆25Feb 28, 2024Updated 2 years ago
- Self Delete DLL☆23Feb 15, 2024Updated 2 years ago
- Laravel Azampay☆30Jan 12, 2026Updated last month
- ☆30Aug 24, 2025Updated 6 months ago
- BayesML: your first library for Bayesian machine learning☆19Jan 27, 2026Updated last month
- Your very own terminal AI assisstant 🤖☆31Mar 8, 2023Updated 2 years ago
- A curation of awesome tools and projects built by Tanzanian developers.☆77Jan 29, 2025Updated last year
- A framework for backdooring Microsoft Nuget packages.☆10Jan 9, 2024Updated 2 years ago
- PhishSticks: A project made for the course "Infra Project 2023" at Haaga-Helia. Creating tools for ethical pentesting by making a simul…☆10Dec 12, 2023Updated 2 years ago
- Powerful Wireless Network Auditing Framework - 2023☆10Sep 10, 2023Updated 2 years ago
- making printf work for you☆15Nov 10, 2025Updated 3 months ago
- Take control of a remote machine using reverse shells in python(The hacking side of python)☆10May 23, 2023Updated 2 years ago
- Using Python to blur faces in images and videos, ensuring quality is maintained. Aimed at protecting online privacy.☆10Jan 8, 2024Updated 2 years ago
- Hide your Ass by changing Public IP and userAgents in every 10 seconds - CYBERSECURITY☆10Feb 19, 2023Updated 3 years ago
- A bot that wins at roulette☆13Dec 22, 2019Updated 6 years ago
- Basic HTTP Server with a feature to invoke a shell in the dir the files are being served from.☆12Apr 14, 2018Updated 7 years ago
- Automatially unzip files added to a specified directory☆14Mar 12, 2022Updated 3 years ago
- ☆46Sep 24, 2025Updated 5 months ago
- Your new favorite tool for pentesting.☆10Jul 31, 2024Updated last year
- ☆12Jun 22, 2022Updated 3 years ago
- Threadless Injection Payload Toolkit☆12Oct 12, 2023Updated 2 years ago
- Quantum Insert Backdoor POC☆11May 21, 2017Updated 8 years ago
- Command line language server protocol client (LSPC)☆11Jul 31, 2018Updated 7 years ago
- Learn Winapi in this Repo with examples, to understand its abstraction in reverse engineering for Windows.☆11Aug 8, 2022Updated 3 years ago
- MiniO verify interface sensitive information disclosure vulnerability (CVE-2023-28432)☆10Mar 24, 2023Updated 2 years ago
- Binary and Static Releases☆16Feb 20, 2026Updated 2 weeks ago
- Sophos Central PowerShell module☆11Jul 11, 2023Updated 2 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- A proof of concept AMSI & ETW bypass using trampolines for hooking and modifying execution flow☆18Jun 26, 2025Updated 8 months ago
- Encrypt any C# binary or bin file☆12Aug 1, 2024Updated last year
- Volumetric Development☆11Mar 19, 2024Updated last year
- Query LDAP and AD with SQL☆10Jun 17, 2021Updated 4 years ago
- Collection of self-made Red Team tools that have come in handy☆12Aug 25, 2024Updated last year
- ☆11Jul 11, 2023Updated 2 years ago