☆21Mar 12, 2022Updated 3 years ago
Alternatives and similar repositories for Linux-Commands-Mindmap
Users that are interested in Linux-Commands-Mindmap are comparing it to the libraries listed below
Sorting:
- ☆15Apr 4, 2022Updated 3 years ago
- This repository will contain python scripts for hackers and pentesters☆25Mar 11, 2022Updated 3 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- ☆10Jul 29, 2022Updated 3 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- A python script that finds endpoints in JavaScript files☆10Nov 29, 2019Updated 6 years ago
- This is the Ultimate Windows 10 Script & Gaming Mod from a creation from multiple debloat scripts and gists from github.☆20Jan 12, 2022Updated 4 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- ☆18Apr 30, 2025Updated 10 months ago
- ☆12Sep 25, 2020Updated 5 years ago
- ☆13Dec 4, 2023Updated 2 years ago
- ☆11Jun 5, 2022Updated 3 years ago
- Let's Snatch The Admin Panel Of Any Website In Seconds.☆17Feb 24, 2020Updated 6 years ago
- gtfobin checker☆11Oct 25, 2020Updated 5 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- Ciphers implemented in python [This is not a serious project. Just an attempt to learn python]☆10May 20, 2018Updated 7 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆11Oct 18, 2022Updated 3 years ago
- A dropper that decrypts encrypted xor payload and can inject it in explorer.exe proccess☆10Aug 1, 2021Updated 4 years ago
- Tutorial on Full Stack application using Python Django and React JS☆16Mar 13, 2024Updated last year
- A collection of useful aggressor scripts. All credits due to its authors.☆12Jul 5, 2019Updated 6 years ago
- MODBUS Penetration Testing Framework☆12Jul 2, 2017Updated 8 years ago
- RSYaba Modular Brute Force Attacker☆19Jun 2, 2014Updated 11 years ago
- tlsplayback is a set of Proof of Concepts (PoC) showing real-world replay attacks against TLS 1.3 libraries and browsers by exploiting 0-…☆16Aug 11, 2018Updated 7 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated 2 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- ☆13Oct 29, 2014Updated 11 years ago
- python tools to assist in penetration testing☆14Jan 19, 2026Updated last month
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆14Oct 29, 2019Updated 6 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A list of useful payloads and bypass for Web Application Security☆14Nov 26, 2023Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago