SYMBOL INDEX (44 symbols across 22 files) FILE: cloud_aws_s3.py function main (line 22) | def main(access_key, secret_access_key, query): FILE: cloud_aws_secrets.py function leak_secrets (line 21) | def leak_secrets(access_key, secret_access_key, region_name): FILE: cloud_azure_ad.py function main (line 23) | def main(domain, client_id, client_secret): FILE: cloud_gsuite_backdoor.py function get_credentials (line 25) | def get_credentials(): FILE: cloud_gsuite_email.py function main (line 24) | def main(): FILE: crack_jwt.py function main (line 23) | def main(url, password_file): function exploit (line 40) | def exploit(token, password): function decode_jwt (line 48) | def decode_jwt(token, password): FILE: live_host_discovery.py function main (line 21) | def main(host): FILE: live_port_discovery.py function main (line 21) | def main(host,ports): function check_ports (line 39) | def check_ports(host, ports): FILE: passwords_attack.py function main (line 21) | def main(url, user_file, password_file): function check_auth (line 38) | def check_auth(url, user, password): FILE: pivot_psremoting.py function main (line 22) | def main(host, username, password, command): FILE: pivot_winrm.py function main (line 21) | def main(computer, username, password, command): FILE: pivot_wmi.py function main (line 23) | def main(host, username, password, command_path): FILE: powerstrip.py class PowerStrip (line 11) | class PowerStrip(): method __init__ (line 15) | def __init__(self, filename, stutter=False): method run (line 26) | def run(self): method process_file (line 37) | def process_file(self): FILE: pyinjector.py class InjectProcess (line 15) | class InjectProcess(): method __init__ (line 66) | def __init__(self, shellcode=None): method kernel32_function_definitions (line 111) | def kernel32_function_definitions(self): method select_pid (line 205) | def select_pid(self): method same_process_virtualalloc (line 222) | def same_process_virtualalloc(self): method same_process_heapalloc (line 241) | def same_process_heapalloc(self): method inject_process_CreateRemoteThread (line 256) | def inject_process_CreateRemoteThread(self): FILE: pymeta.py class PyMetaExtractor (line 9) | class PyMetaExtractor(): method __init__ (line 13) | def __init__(self, directory): method run (line 18) | def run(self): method openxml (line 34) | def openxml(self, pathname): method pdf (line 45) | def pdf(self, pathname): FILE: shodan_search.py function main (line 21) | def main(api_key, search): FILE: socket_c2_client.py function main (line 23) | def main(): function listen_commands (line 31) | def listen_commands(sock): FILE: socket_c2_server.py function main (line 22) | def main(): function listen_results (line 35) | def listen_results(conn): FILE: web_brute.py function main (line 21) | def main(filename, base_url): function check_url (line 27) | def check_url(url): FILE: web_robots.py function main (line 20) | def main(url): FILE: web_sniff.py function main (line 20) | def main(): function http_header (line 23) | def http_header(packet): function print_packet (line 28) | def print_packet(packet1): FILE: web_spa.py function main (line 25) | def main(url):