Collection of Jupyter notebooks
☆13Mar 11, 2021Updated 5 years ago
Alternatives and similar repositories for jupyter
Users that are interested in jupyter are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 10 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 6 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 9 months ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 4 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 9 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Chromium Cookie import / export tool☆314Jun 20, 2023Updated 2 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Mar 17, 2021Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- ☆60Feb 10, 2022Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆38Oct 12, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A stealthier approach to WMI-based command execution using Impacket without touching the disk.☆78Mar 15, 2026Updated last month
- ☆73Oct 24, 2021Updated 4 years ago
- ☆61Aug 30, 2021Updated 4 years ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Mar 16, 2020Updated 6 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 6 years ago
- 宽字节安全团队的博客☆30Mar 29, 2021Updated 5 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆52Dec 11, 2019Updated 6 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- Mockingjay Process Injection Vulnerable DLL Finder☆20Jun 30, 2023Updated 2 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Feb 9, 2026Updated 2 months ago
- Pentesting, Red Teaming. Reports☆12May 25, 2023Updated 2 years ago
- ☆53Sep 16, 2021Updated 4 years ago