Miscellaneous for various things
☆21Nov 19, 2024Updated last year
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- A cross platform tool for verifying credentials and executing single commands☆33Apr 19, 2019Updated 6 years ago
- Automated Security Assessment Reporting Tool☆37Dec 23, 2017Updated 8 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- A tool to evaluate the password health of Active Directory accounts.☆43Nov 19, 2024Updated last year
- wordpress xmlrpc + wp-login.php brute force☆10Mar 13, 2021Updated 4 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Dec 8, 2022Updated 3 years ago
- Auto Web Vulnerability Scanning Framework☆10Feb 3, 2016Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- OnionSprout is a tool to run publicaly-accessible web services, for example from Raspberry Pi in your home, without a public IP.☆11Oct 3, 2020Updated 5 years ago
- automated penetration toolkit☆12Jul 9, 2016Updated 9 years ago
- Competition Infrastructure Management☆88Nov 17, 2021Updated 4 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- ☆14Feb 4, 2024Updated 2 years ago
- NTFSx is a tool for extracting files from an NTFS filesystem that are otherwise inaccessible.☆14Jul 26, 2013Updated 12 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Pdf File : Exfiltration and Uploading DATA by DNS Traffic (AAAA Records)☆10Jun 7, 2023Updated 2 years ago
- autopwn + deployment☆15Apr 13, 2022Updated 3 years ago
- ☆12Jun 28, 2023Updated 2 years ago
- A powershell based traffic generation scripts to simulate user activity via Internet Explorer☆15May 6, 2015Updated 10 years ago
- C# code for Transferring Backdoor Payloads by ICMPv4 Traffic and bypassing Anti-Viruses☆29Jun 6, 2023Updated 2 years ago
- A progressive, customizable armored SSH tunnel implant for Linux and MacOS systems☆134Apr 11, 2019Updated 6 years ago
- Automation Hacking & Penetration Testing Suite☆11Aug 12, 2016Updated 9 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Mar 9, 2018Updated 7 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 3 years ago
- This contains the public CCDC materials for Cyber@UCR.☆38Dec 2, 2023Updated 2 years ago
- A modular pentesting framework implemented in C☆13Aug 6, 2018Updated 7 years ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated 11 months ago
- Tests AD passwords while respecting Bad Password Count☆18Mar 27, 2019Updated 6 years ago
- Common Sense Security Framework☆15Apr 26, 2018Updated 7 years ago
- Official challenge and writeup repository for RITSEC CTF 2018.☆16Nov 30, 2018Updated 7 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Judge is a tool for scoring/debugging network services on a CCDC (or similar competition) network.☆21Oct 4, 2017Updated 8 years ago
- Quick Malicious ClickOnceGenerator for Red Team☆273Jan 27, 2021Updated 5 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Takes the original idea of NetCease and adds functionality☆24Feb 6, 2022Updated 4 years ago
- Resources I've found helpful for learning computing security.☆14Dec 26, 2019Updated 6 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago