xpn / jupyterView external linksLinks
Collection of Jupyter notebooks
☆14Mar 11, 2021Updated 4 years ago
Alternatives and similar repositories for jupyter
Users that are interested in jupyter are comparing it to the libraries listed below
Sorting:
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Source code in Win32 ASM and C for a shellcode execution wrapper designed to mitigate the risk of shellcode execution on a host other tha…☆19Apr 30, 2016Updated 9 years ago
- Inject Frida-Gadget into a local process☆26Jul 5, 2019Updated 6 years ago
- Grab unsaved Notepad contents with a Beacon Object File☆55Jun 19, 2022Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- CobaltStrike AggressorScripts for the lazy☆10Jul 22, 2022Updated 3 years ago
- F5 Service Password Decryption☆29Jul 31, 2025Updated 6 months ago
- Collection of scripts that I created to make my life easier.☆12May 10, 2021Updated 4 years ago
- Dell Driver EoP (CVE-2021-21551)☆32Feb 24, 2022Updated 3 years ago
- Ransoblin (Ransomware Bokoblin)☆18Oct 4, 2020Updated 5 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- ☆73Oct 24, 2021Updated 4 years ago
- This is a project to receive Base64 data and decode it in process☆15Mar 16, 2020Updated 5 years ago
- ☆15Jul 5, 2019Updated 6 years ago
- ☆16Sep 23, 2021Updated 4 years ago
- ☆38Oct 12, 2020Updated 5 years ago
- Research into COM☆19Jan 25, 2020Updated 6 years ago
- Chromium Cookie import / export tool☆310Jun 20, 2023Updated 2 years ago
- Aggressor Script to Execute Assemblies from Github☆71Nov 30, 2020Updated 5 years ago
- aggressor and pycobalt scripts.☆18Nov 17, 2020Updated 5 years ago
- (kinda) Malicious Outlook Reader☆19Mar 2, 2021Updated 4 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 4 years ago
- ☆71Sep 17, 2020Updated 5 years ago
- Convert an LDIF file to JSON files ingestible by BloodHound☆45Apr 4, 2025Updated 10 months ago
- Collection of tested Cobaltstrike aggressor scripts.☆118Mar 16, 2020Updated 5 years ago
- a minimalistic winrm client written in python☆25May 15, 2025Updated 8 months ago
- Mockingjay Process Injection Vulnerable DLL Finder☆19Jun 30, 2023Updated 2 years ago
- ☆19Mar 16, 2021Updated 4 years ago
- A VSCode devcontainer for development of COFF files with batteries included.☆50Jul 10, 2023Updated 2 years ago
- Alternative C# Implementation tool to retrieve Active Directory Integrated DNS records with IP addresses☆50Aug 8, 2020Updated 5 years ago
- A Model Context Protocol (MCP) server to converse with data in Bloodhound☆54Jan 17, 2026Updated 3 weeks ago
- macOS shellcode loader written in Objective-C☆49Jul 15, 2022Updated 3 years ago
- This is a Poc for BIGIP iControl unauth RCE☆51Mar 17, 2021Updated 4 years ago
- StealthGuardian is a middleware layer that can be combined with adversary simulation tools to verify the resistance, detection level and…☆20Aug 7, 2024Updated last year
- ☆52Dec 11, 2019Updated 6 years ago
- .NET implementation of Cobalt Strike's External C2 Spec☆90Nov 12, 2021Updated 4 years ago
- ☆25Jul 5, 2018Updated 7 years ago
- ☆62Feb 10, 2022Updated 4 years ago
- ☆53Sep 16, 2021Updated 4 years ago