JohnTroony / ScriptologyLinks
Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.
☆33Updated 6 years ago
Alternatives and similar repositories for Scriptology
Users that are interested in Scriptology are comparing it to the libraries listed below
Sorting:
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- scripts for pentesting☆88Updated 7 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- Reconnaissance scripts for penetration testing☆58Updated 10 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Updated 9 years ago
- ☆57Updated 5 years ago
- Hacking challenges☆31Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- cisco-torch : mass scanning, fingerprinting, and exploitation tool☆44Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆91Updated 9 years ago
- Repo contains a list of random scripts that I use while testing out random things.☆48Updated 6 years ago
- Linux setup tool for Kali Linux☆79Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Shell-style script to search exploit-db.com exploits.☆62Updated last year
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- Search drives for documents containing passwords☆64Updated 11 years ago
- Nacker is a tool to circumvent 802.1x Network Access Control (NAC) on a wired LAN. Nacker will help you locate any non-802.1x configurabl…☆106Updated 11 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆100Updated 2 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- ☆61Updated 7 years ago
- Examine HTTP response headers for common security issues☆38Updated 3 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- Just a collection of pentest stuffs☆93Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆85Updated 7 years ago
- My collection of nmap nse modules☆64Updated 6 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- tools for analyzing strings from password lists☆59Updated 3 years ago