Miscellaneous for various things
☆21Nov 19, 2024Updated last year
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- A cross platform tool for verifying credentials and executing single commands☆32Apr 19, 2019Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 8 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 5 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Oct 3, 2020Updated 5 years ago
- Proof of concept exploit script used to exploit the MS15-034 vulnerability in the Windows HTTP Protocol Stack (HTTP.sys)☆18Mar 27, 2017Updated 8 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- A cross-platform C2/teamserver supporting multiple transport protocols, written in Go.☆44Feb 25, 2023Updated 3 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Jul 31, 2020Updated 5 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- Official challenge and writeup repository for RITSEC CTF 2018.☆16Nov 30, 2018Updated 7 years ago
- frown (frida-own) – an instrumentation challenge☆25Jan 20, 2024Updated 2 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- A repo full of example gscripts☆101Sep 6, 2019Updated 6 years ago
- A framework for creating modular bots/backdoors☆21Jul 27, 2015Updated 10 years ago
- Repo for reverse engineering the Hantek 6254BD USB-connected oscilloscope☆14Jul 21, 2019Updated 6 years ago
- Practical examples and simulations developed at GNURadio☆17Feb 15, 2021Updated 5 years ago
- ☆25Jan 18, 2015Updated 11 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆31Feb 10, 2025Updated last year
- ☆33Jun 12, 2024Updated last year
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- A lightweight red teaming platform utilizing concurrent nmap scans to populate a collaborative web server.☆23Feb 22, 2026Updated 3 weeks ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago