JohnTroony / Scriptology
Collection of some scripts I've written in Perl, Python BASH, GO and JS to automate some common ops.
☆33Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Scriptology
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- Browse and search through nmap's NSE scripts.☆59Updated 7 years ago
- Automated enumeration☆30Updated 3 years ago
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆23Updated 7 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 11 years ago
- ☆21Updated 7 years ago
- WhiteBox CMS analysis☆68Updated last year
- Various tools for managing bug bounty recon and exploration.☆46Updated last year
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 7 years ago
- Small, one-off scripts for security related stuff I've written over time☆35Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 7 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 4 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆66Updated 2 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 8 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- Hacking challenges☆33Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆35Updated 5 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆67Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago