ChrisJohnRiley / Random_CodeLinks
Random Code, POC Scripts and other things (Your Mileage May Vary)
☆89Updated 6 years ago
Alternatives and similar repositories for Random_Code
Users that are interested in Random_Code are comparing it to the libraries listed below
Sorting:
- A simple python script used to generate bit flipped versions of domain names☆23Updated 4 years ago
- Duct Tape Command and Control!☆94Updated 6 years ago
- Web Sight Docker Deployment☆123Updated 7 years ago
- Stargate☆94Updated 8 years ago
- Distributed wrapper around oclHashcat☆89Updated 2 months ago
- Alohomora was written as a POC and presented at both DefCon and Derby Con. The application marries data pulled from the Ohio Voter Regist…☆43Updated 7 years ago
- CTF website frontend for SecGen☆21Updated 7 years ago
- Detect snooper on your system!☆83Updated 8 years ago
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago
- ☆143Updated 8 years ago
- GPG Reaper - Obtain/Steal/Restore GPG Private Keys from gpg-agent cache/memory☆94Updated 7 years ago
- Just a place to dump the cdma data I collected while at Defcon 2016☆50Updated 8 years ago
- DEF CON for N00bs is an open guide for first time attendees to the convention.☆45Updated 8 years ago
- Analysis of wifi probe request data☆11Updated 7 years ago
- Steals cleartext passwords from webservices, by reading the memory of browsers☆29Updated 8 years ago
- Battalion is a tool used to automate reconnaissance and assist both pentesters and internal security/admin teams.☆44Updated 5 years ago
- Automated password cracking with AWS GPU instances and CUDA hashcat☆51Updated 10 years ago
- ☆57Updated 4 years ago
- Bash and Python Honeyport scripts☆45Updated 8 years ago
- Uses Shodan to locate HackingTeam C&C Servers.☆78Updated 9 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆45Updated 5 years ago
- Proof of Concept - Utilize misconfigured newsletter forms to spam / deny service to an inbox☆55Updated 4 years ago
- Tampermonkey script to extract information from Meteor applications☆34Updated 8 years ago
- Collection of metasploit modules☆68Updated 8 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- Computer Network Defender's Toolkit, specializing in active defense techniques.☆7Updated 5 years ago
- Analysis Suite For EAP Enabled Wireless Networks☆125Updated 6 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- x86-64 Windows shellcode that recreates the Jurassic Park hacking scene (Ah, ah, ah... you didn't' say the magic word!)☆85Updated 4 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Updated 9 years ago