A set of bash scripts for offensive security pentesting. (Machine with Kali reccomended)
☆13Sep 30, 2016Updated 9 years ago
Alternatives and similar repositories for Offensive-Scripts
Users that are interested in Offensive-Scripts are comparing it to the libraries listed below
Sorting:
- a script for Kali Linux☆10Jun 28, 2013Updated 12 years ago
- Hack facebook using this python script - Kali Linux☆15Jun 14, 2021Updated 4 years ago
- Scripts for Kali Linux☆17May 25, 2017Updated 8 years ago
- A custom script I created because I got tired of installing my tools manually!☆15May 16, 2023Updated 2 years ago
- ☆21Oct 24, 2012Updated 13 years ago
- Fix Kali 2 Sana issues and post install script for various tools☆18Mar 22, 2016Updated 9 years ago
- Little cleaner script for Kali linux.Clean apt cache,Removing old config files,Removing old kernels,Emptying every trashes.☆73Jan 31, 2020Updated 6 years ago
- Pentest dropbox setup scripts for Kali Linux☆90Feb 15, 2016Updated 10 years ago
- Automatic configuration script for linux beginners (compatible with Centos/Debian/Kali/Ubuntu/Mint)☆30Mar 20, 2019Updated 6 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Ducky Script for Arduino Leonardo Mini & Arduino Uno + Payload to Arduino Converter☆34Mar 27, 2018Updated 7 years ago
- DoS PoC's for SAP products☆51Jan 23, 2018Updated 8 years ago
- service to check internet accessibility☆42Apr 30, 2024Updated last year
- Script to run after a Debian based install (Ubuntu, Kali, Raspberry Pi...)☆10Sep 20, 2025Updated 5 months ago
- emv software clone datas DUMPS from original card holder to chip blank card jcop any new generation blank card☆15Oct 25, 2017Updated 8 years ago
- Personal notes and lab results pertaining to the text "Practical Malware Analysis" by Michael Sikorski and Andrew Honiq.☆12Oct 28, 2017Updated 8 years ago
- Script to convert duckyscript files to a format usable by Kali NetHunter's HID attack capabilities.☆11Jan 30, 2015Updated 11 years ago
- Teensy code to brute force a keylogger's unlock code☆15Sep 5, 2016Updated 9 years ago
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 8 years ago
- Tutorials and video lessons on applying machine learning and deep learning to cybersecurity☆13Mar 28, 2019Updated 6 years ago
- The ARP Scanner☆11Apr 19, 2014Updated 11 years ago
- Excel spreadsheet that can search a large number of spreadsheets for specific text☆15May 17, 2017Updated 8 years ago
- ☆11Aug 11, 2014Updated 11 years ago
- Documents and whitepapers☆12Aug 9, 2016Updated 9 years ago
- Remove Offensive and Profane Words from Wordlists☆15Jul 27, 2023Updated 2 years ago
- LLM Supported Attack Scenario Creator from Code Review☆14Oct 22, 2024Updated last year
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 5 years ago
- SQL injection detection engine by tokenzing and syntax analysis, like SQLChop☆10May 8, 2017Updated 8 years ago
- ☆11Apr 18, 2018Updated 7 years ago
- CADGMM (PAKDD2020)☆11Jan 2, 2021Updated 5 years ago
- Python script to create Termux packages easily.☆12Feb 8, 2022Updated 4 years ago
- ☆13Apr 23, 2018Updated 7 years ago
- a raspberry pi pico rubber ducky device that will constantly rick roll☆11Apr 4, 2021Updated 4 years ago
- Makes working with OWL ontologies in Java easy by auto-generating classes that wrap OWL instances with a convenient API☆17Jul 20, 2010Updated 15 years ago
- OSINT Web Page Finder☆11May 20, 2020Updated 5 years ago
- Java Combinatorial Optimization Platform☆13Apr 1, 2014Updated 11 years ago
- NXPNFC_P61_JCOP_Kit☆14Dec 14, 2018Updated 7 years ago
- A remake of iRecovery based off the syringe library.☆27Apr 11, 2011Updated 14 years ago
- ☆13Jun 1, 2021Updated 4 years ago