Install Script for CS
☆11Aug 26, 2019Updated 6 years ago
Alternatives and similar repositories for CS-Scripts
Users that are interested in CS-Scripts are comparing it to the libraries listed below
Sorting:
- ☆18Jan 27, 2018Updated 8 years ago
- Tampermonkey script to extract information from Meteor applications☆34Nov 3, 2016Updated 9 years ago
- A companion repo to accompany detailed guides and YouTube content to allow users to follow along☆13Aug 29, 2020Updated 5 years ago
- ☆15May 17, 2018Updated 7 years ago
- Liferay puppet example☆15Feb 9, 2015Updated 11 years ago
- A Maven dependency graph generator for Bazel☆17Jan 7, 2026Updated last month
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- A golang package for retrieving values from the Microsoft LDAP property, `UserAccountControl`☆16Oct 28, 2021Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Mar 1, 2021Updated 4 years ago
- Lightweight C# windows agent for Apfell☆17Mar 16, 2020Updated 5 years ago
- Powershell & Python XOR 2 Files☆15Nov 22, 2018Updated 7 years ago
- With this tool, projects can be compiled easily for fuzzing with AFL or for static code analysis with tools like CBMC. One-line-scan hook…☆21Jan 3, 2023Updated 3 years ago
- A Go (golang) Utility package for decoding Active Directory objectSID☆26Nov 26, 2019Updated 6 years ago
- A parser to extract information from .nessus file format☆23Mar 26, 2021Updated 4 years ago
- ☆23Apr 22, 2020Updated 5 years ago
- C# version of MDSec's ParallelSyscalls☆141Jan 9, 2022Updated 4 years ago
- Syscall BOF to arbitrarily add/detract process token privilege rights.☆61Jul 10, 2024Updated last year
- ☆27Feb 3, 2026Updated 3 weeks ago
- An easy to navigate list of unicode characters that have risky transformations 💥☆25Mar 22, 2022Updated 3 years ago
- treafik fronted c2 examples☆25Dec 6, 2020Updated 5 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- Cypher for Defenders: Leveraging Bloodhound Data Beyond the UI☆26Feb 8, 2024Updated 2 years ago
- Example implementation of DNSAdmin DLL PrivEsc attack☆28Dec 11, 2019Updated 6 years ago
- PowerShell module to play with Kerberos S4U extensions☆52Apr 2, 2017Updated 8 years ago
- DLL Generator for side loading attack☆175Feb 5, 2019Updated 7 years ago
- ☆59Aug 11, 2023Updated 2 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- A simple PDF summarizer with Node.js and groq-sdk☆11Jan 11, 2025Updated last year
- How to spoof the command line when spawning a new process from C#.☆110Dec 28, 2021Updated 4 years ago
- This tool allows you to get the approximate location of a Wi-Fi access point (AP) using the long-awaited: Wigle.net API.☆33Mar 3, 2023Updated 2 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- AutoPoC Generator HoneyPoC☆36Dec 7, 2025Updated 2 months ago
- Perun's Fart (Slavic God's Luck). Another method for unhooking AV and EDR, this is my C# version.☆117Dec 26, 2021Updated 4 years ago
- LdrLoadDll Unhooking☆135Jan 16, 2022Updated 4 years ago
- Herramienta para realizar fuerza bruta a diferentes servicios.☆10Sep 13, 2021Updated 4 years ago
- ☆29Mar 31, 2017Updated 8 years ago
- My Python Cookiecutter project template☆32Sep 6, 2022Updated 3 years ago
- intentionally vulnerable API☆30Sep 10, 2024Updated last year
- A python script that allows a researcher to merge databases from Malshare and Malware Bazaar to created enrriched datasets from SIEM tool…☆27Apr 6, 2020Updated 5 years ago