ChrisJohnRiley / Random_CodeLinks
Random Code, POC Scripts and other things (Your Mileage May Vary)
☆89Updated 6 years ago
Alternatives and similar repositories for Random_Code
Users that are interested in Random_Code are comparing it to the libraries listed below
Sorting:
- Stargate☆95Updated 9 years ago
- Web Sight Docker Deployment☆122Updated 7 years ago
- ☆144Updated 8 years ago
- Duct Tape Command and Control!☆96Updated 3 weeks ago
- TFTP Theft is a tool which allows one to quickly scan/bruteforce a tftp server for files and download them instantly☆69Updated 9 years ago
- penetration testing scripts☆136Updated 5 years ago
- Dashboard of Fail. A application to carve out images/accounts/vulns on conference networks and display them for general entertainment.☆124Updated 6 years ago
- Proof-of-concept JavaScript malware implemented as a Proxy Auto-Configuration (PAC) File☆160Updated 9 years ago
- A tool to speed up the process of doing the same simple IP/Domain Name lookups over and over again.☆67Updated 6 years ago
- ☆92Updated 7 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated last week
- Unveiled at DEF CON 20, NTLM Relaying to ALL THE THINGS!☆260Updated 9 years ago
- PwnableWeb is a suite of web applications for use in information security training.☆87Updated 11 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆43Updated 6 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆175Updated 7 years ago
- Fast http dead file finder.☆218Updated last month
- Distributed wrapper around oclHashcat☆90Updated 4 months ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆95Updated 7 years ago
- A tool to generate graph and other output from NMAP XML files☆117Updated 6 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 6 years ago
- ☆61Updated 7 years ago
- How often does your password appear in the Pwned Passwords database? Uses the k-anonymity API.☆153Updated 4 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- Kerberos / Windows AD / Linux PAM password change check against breached lists (HIBP), and other rules☆160Updated 2 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Common Findings Database☆101Updated 6 years ago
- Spacebin is a proof-of-concept malware that exfiltrates data (from No Direct Internet Access environments) via triggering AV on the endpo…☆88Updated 8 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago