Scripts created by MRG Effitas
☆42Nov 22, 2016Updated 9 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆21Aug 7, 2014Updated 11 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- Mass Triage Tools☆20Mar 10, 2026Updated 3 weeks ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- WinAppDbg helper script to catch API calls☆12Mar 26, 2013Updated 13 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Hashfind - A tool to search files for matching password hash types and other interesting data.☆18Feb 12, 2015Updated 11 years ago
- A tool evaluates security configurations of a given PE based on SDL without source code☆16Jul 6, 2014Updated 11 years ago
- Dalvik Header Plugin for IDA Pro☆23Jan 22, 2013Updated 13 years ago
- Local privilege escalation scripts and tools☆17Aug 4, 2016Updated 9 years ago
- A cross-platform assistant for creating malicious MS Office documents. Can hide VBA macros, stomp VBA code (via P-Code) and confuse macro…☆19Nov 20, 2020Updated 5 years ago
- ELF header abuse☆50Mar 23, 2016Updated 10 years ago
- Analyzes open source bug trackers for interesting vulnerabilities☆23Feb 3, 2015Updated 11 years ago
- A Custom Scanner for Burp☆31Mar 26, 2014Updated 12 years ago
- Check for HTTP Security Headers☆14Aug 17, 2015Updated 10 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 9 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Passive DNS V2☆60Mar 27, 2014Updated 12 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago
- Smart DLL execution for malware analysis in sandbox systems☆144Feb 16, 2015Updated 11 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- A pure Python library to parse ELF files.☆15Aug 7, 2013Updated 12 years ago
- Transform dumped executable memory back into an identical match from disk. Use network or local database to de-locate relocated binaries…☆12Jan 10, 2016Updated 10 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Create shellcode from executable or assembly code☆12Jul 31, 2017Updated 8 years ago
- Exploits that are mostly ready to use. They either require no modification or have been modified and verified as functional.☆61May 11, 2015Updated 10 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- Resources, articles, thoughts, datasets, papers on TI tradecraft☆11Aug 24, 2018Updated 7 years ago
- Procmonel is Procmon like monitoring system implemented using Microsoft WDK☆13Dec 25, 2019Updated 6 years ago
- zer0m0n driver for cuckoo sandbox☆23Feb 24, 2015Updated 11 years ago
- Kernel (Ring0) - SSDT unhook driver☆14Feb 22, 2018Updated 8 years ago
- Metasploit pattern generator in Python, modified to be used as a function☆23Apr 20, 2015Updated 10 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A log collector for Peach fuzzing in the cloud☆28Apr 2, 2014Updated 12 years ago
- Malware Libraries focused in help Malware Development☆25Mar 20, 2023Updated 3 years ago
- FRAC and RIFT☆17Mar 16, 2019Updated 7 years ago
- The LogParserPlus application, which uses Microsoft's Log Parser.☆12Jul 30, 2017Updated 8 years ago
- Arduino-based network monitor☆24Sep 19, 2011Updated 14 years ago
- unXOR will search a XORed file and try to guess the key using known-plaintext attacks.☆146Apr 23, 2020Updated 5 years ago
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago