FreeZeroDays / OSSLinks
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
☆13Updated 7 months ago
Alternatives and similar repositories for OSS
Users that are interested in OSS are comparing it to the libraries listed below
Sorting:
- Perform OSINT on external targets using Shodan☆22Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- ☆17Updated 3 years ago
- Recon-ng modules for basic OSINT.☆11Updated 3 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- This is a simple Python script that connects to a MISP instance and retrieves attributes of specific types (such as IP addresses, URLs, a…☆16Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Searching .evtx logs for remote connections☆24Updated 2 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Simple C2 over the Trello API☆39Updated 2 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- A collection of my presentation materials.☆17Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆36Updated 2 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 8 months ago
- buffer overflow examples☆22Updated 7 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.☆17Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆16Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Updated 5 years ago
- CRACK AND CHECK HASH TYPES IN BULK☆12Updated 4 years ago