Small, one-off scripts for security related stuff I've written over time
☆37Mar 2, 2025Updated last year
Alternatives and similar repositories for security-scripts
Users that are interested in security-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A sample bot for Cobalt Strike 3☆22Jun 11, 2016Updated 9 years ago
- Aggressor scripts I've made for Cobalt Strike☆414Jul 29, 2023Updated 2 years ago
- Python Package for burprestapi☆17Dec 27, 2019Updated 6 years ago
- Small utility script to notify via Slack about Hashcat's progress during a password cracking session☆10Mar 10, 2019Updated 7 years ago
- Lair Framework dockerized.☆38Apr 17, 2021Updated 5 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- NMAP Patches and NSE Scripts☆19Apr 4, 2013Updated 13 years ago
- IRC bot for cracking hashes☆18Apr 6, 2021Updated 5 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- MS15-076 Privilege Escalation☆16Aug 11, 2015Updated 10 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- Python api for usage with cobalt strike's External C2 specification☆240Mar 22, 2023Updated 3 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆65Dec 27, 2017Updated 8 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Nov 9, 2018Updated 7 years ago
- Spawn Up quickly Elastic EDR Panel☆16Jan 29, 2022Updated 4 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Library of tools and examples for loading/bootstrapping managed code from unmanaged code in .NET☆64Nov 22, 2019Updated 6 years ago
- Event Log Analysis Tools☆31Sep 27, 2016Updated 9 years ago
- ☆11Apr 18, 2018Updated 8 years ago
- A small, unfinished utility to browse and download NirSoft programs.☆18Jun 14, 2020Updated 5 years ago
- Collection of configuration files that can be used as good starting points to secure different services and tools☆17Mar 22, 2026Updated last month
- Windows Trollware and Persistence Script☆13Sep 16, 2015Updated 10 years ago
- a CMD shell in masm that listens on port 8080☆12Dec 19, 2020Updated 5 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Linux Enumeration / Privilege escalation tool☆27Sep 3, 2020Updated 5 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Security Logon Event Analysis Tools - a collection of scripts for collecting, parsing, and analyzing logon events from Windows Security L…☆16Jun 22, 2016Updated 9 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆10Jun 28, 2020Updated 5 years ago
- ☆18Jun 23, 2017Updated 8 years ago
- Generates anti-sandbox analysis HTA files without payloads☆16Mar 16, 2017Updated 9 years ago
- A collection of pcaps☆16Jul 5, 2015Updated 10 years ago
- ☆23Feb 16, 2016Updated 10 years ago
- Damn Vulnerable Web Application (DVWA) Vagrant Box for testing☆14Jun 23, 2016Updated 9 years ago
- Python code for 1) permuting randomly-generated passwords for easier entry on mobile devices, and 2) for estimating entropy lost as a res…☆16May 5, 2016Updated 10 years ago
- Proof of Concept - Using squid url rewrite feature to "hijack" proxy traffic and inject BeEF payload into it.☆13Feb 23, 2015Updated 11 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- ☆19Mar 16, 2021Updated 5 years ago
- Environmental (and http) keying for scripting languages☆39Oct 5, 2018Updated 7 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Implementing Kerberoast attack fully in python☆72Sep 29, 2018Updated 7 years ago
- Collection of Utility scripts☆16Sep 11, 2019Updated 6 years ago
- WigleAPI-JSON in PHP with JSON Response☆14Nov 18, 2013Updated 12 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago