JohnTroony / ScriptologyLinks
Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.
☆33Updated 7 years ago
Alternatives and similar repositories for Scriptology
Users that are interested in Scriptology are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- scripts for pentesting☆88Updated 7 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Neto | A tool to analyse browser extensions☆88Updated 5 years ago
- Linux setup tool for Kali Linux☆80Updated 7 years ago
- ☆57Updated 5 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated 2 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Examine HTTP response headers for common security issues☆38Updated 3 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆107Updated 11 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Scripts for Deploying new server☆49Updated 6 months ago
- ☆106Updated 4 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆21Updated 8 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- tools for analyzing strings from password lists☆59Updated 3 years ago