AICDEV / annoy-the-script-kiddieLinks
Collection of scripts and other content to make the life of bots and script-kiddies as hard as possible
☆45Updated 3 months ago
Alternatives and similar repositories for annoy-the-script-kiddie
Users that are interested in annoy-the-script-kiddie are comparing it to the libraries listed below
Sorting:
- A collection of tools that I use in CTF's or for assessments☆108Updated last year
- This is a fully automated Active directory Lab made with the purpose to reduce the hustle of creating it manually.☆103Updated 5 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated 2 years ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆35Updated 2 years ago
- SpiderCat is an advanced reconnaissance payload that aims to concatanate targets into an Obsidian spider web framework. It allows securit…☆109Updated 2 years ago
- Free training course offered at Hack Space Con 2023☆138Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- ☆24Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year
- A network logging tool that logs per process activities☆32Updated 2 years ago
- Capture screenshots of onion services on an onion service.☆73Updated last year
- ☆45Updated 2 years ago
- My Favorite Offensive Security Scripts☆83Updated 9 months ago
- Modular framework for automating triaging, malware analysis, and analyst workflows☆44Updated 9 months ago
- A small executable to trick a user to authenticate using code matching MFA☆69Updated 2 years ago
- List of Command&Control (C2) software☆48Updated 3 years ago
- Detects CanaryTokens in Office docs and PDFs (docx, xlsx, pptx, pdf) without triggering alerts☆127Updated last month
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆25Updated last year
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆41Updated 2 years ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 8 months ago
- SkeletonKey is capable of advanced encryption, decryption, and breaking ciphers through various methods. These methods include but are no…☆45Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- A full analysis report detailing as much as possible of a Malware or a Threat☆32Updated 2 weeks ago
- An offline Phishing Email Analyzer. Enabling non-techies to analyze phishing emails automatically!☆63Updated 2 years ago
- ☆45Updated last year
- ☆37Updated 4 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago