A collection of pen-testing/hacking scripts. Various uses.
☆13Oct 24, 2020Updated 5 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Provides an easy way to collect and send Slack access & integration logs.☆13Oct 19, 2021Updated 4 years ago
- ☆17Sep 10, 2021Updated 4 years ago
- Work with the AWS IP address ranges in native Python.☆13Sep 21, 2023Updated 2 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- Scripts to automate standing up hosts in Linode☆15Feb 16, 2021Updated 5 years ago
- This is a custom SSM agent which is sorta functional☆17Jul 5, 2021Updated 4 years ago
- Notes for the AWS SysOps Associate exam.☆11Apr 14, 2019Updated 6 years ago
- CDK app to setup an isolated AWS network to experiment with ways of exfiltrating data☆18Nov 18, 2021Updated 4 years ago
- Blockstack/Tor integration☆21May 11, 2017Updated 8 years ago
- Gets in the way of your victim's traffic and out of yours☆27Aug 4, 2019Updated 6 years ago
- Public release of Whalehoney Honeypot☆29Mar 21, 2022Updated 3 years ago
- A Maltego transforms collection for Twint☆30Jul 31, 2020Updated 5 years ago
- SELinux Policies for Vault☆37Feb 20, 2026Updated last week
- OpenCTI Add-On for Splunk☆13Jan 13, 2026Updated last month
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆41Jan 31, 2025Updated last year
- Scripts to automate standing up apache2 with mod_rewrite in front of C2 servers.☆47Feb 17, 2021Updated 5 years ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- Integration of fluent-bit and Splunk using the HTTP Event Collector (Splunk HEC)☆10Oct 16, 2018Updated 7 years ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Red TL;DR Database is a set of text data that provides search for red-tldr. If you don’t know red-tldr yet, please read the documentation…☆41Sep 2, 2022Updated 3 years ago
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- Metasploit Logos that use Z for the new zArch additions☆10Feb 9, 2016Updated 10 years ago
- Python-based proof-of-concept tool for generating payloads that utilize unsafe Java object deserialization.☆10Dec 6, 2021Updated 4 years ago
- 🦈 Prometheus exporter for pcap metrics☆16Feb 15, 2023Updated 3 years ago
- ☆12Sep 4, 2023Updated 2 years ago
- 蜜罐检测工具,支持自动化URL去重、多线程控制及智能速率限制。可识别伪装服务。☆16Jun 5, 2025Updated 8 months ago
- A serverless application for processing AWS GuardDuty findings.☆11Sep 7, 2018Updated 7 years ago
- 🔒 A Node.js ransomware implementation.☆11Jun 17, 2021Updated 4 years ago
- Help deobfuscate VBScript☆18Jul 1, 2022Updated 3 years ago
- A common database library for managing and querying security data☆18Jan 12, 2026Updated last month
- Simple, reliable, and efficient distributed task queue in Rust☆36Feb 1, 2026Updated last month
- Defending IaaS with ATT&CK is a project to create a collection of ATT&CK techniques relevant to a Linux IaaS environment, as well as a me…☆14May 28, 2025Updated 9 months ago
- cybersecurity toolbox☆10Dec 7, 2022Updated 3 years ago
- Machine Learning basics with phishing dataset☆10Apr 19, 2021Updated 4 years ago
- ☆11Dec 9, 2025Updated 2 months ago
- This script is intended to be used with Pokécord to increase your Pokémon's levels, whilst bypassing Discord's rate limiting.☆13Jan 24, 2022Updated 4 years ago
- Method of finding interesting domains using keywords + JARMs☆13Jan 30, 2023Updated 3 years ago
- List of links and resources referred to in my SANS OSINT Summit 2024 Talk "OSINT On The Russian Internet"☆11Feb 29, 2024Updated 2 years ago
- App review platform☆12Jan 11, 2023Updated 3 years ago