FreeZeroDays / OSSLinks
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
☆12Updated 11 months ago
Alternatives and similar repositories for OSS
Users that are interested in OSS are comparing it to the libraries listed below
Sorting:
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- Random Tips and Writeups.☆15Updated 6 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆14Updated last year
- ☆18Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- ☆30Updated 2 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆32Updated 4 years ago
- A command-line utility for auditing DNS configuration using Zonemaster API☆32Updated 2 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆14Updated 6 years ago
- CloudDefense.ai is an automated web application security testing tool that audits your web applications by checking for vulnerabilities l…☆49Updated 2 months ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 3 years ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆35Updated last week
- Custom pentesting tools☆26Updated 5 years ago
- ☆19Updated 4 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- Docker-based platform for conducting MiTM attacks using Responder, NTLMRelayX, and Empire☆21Updated 9 months ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆13Updated 4 years ago
- Easily-guessable Password Generator for Password Spray Attack☆20Updated 5 years ago
- CyberWarFare Labs hands-on workshop on the topic "Detecting Adversarial Tradecrafts/Tools by leveraging ETW"☆51Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- C2Matrix Automation☆15Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11Updated 2 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- ☆19Updated 5 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆17Updated 5 years ago
- Perform OSINT on external targets using Shodan☆22Updated 2 years ago