Und3rf10w / security-scriptsLinks
Small, one-off scripts for security related stuff I've written over time
☆37Updated 9 months ago
Alternatives and similar repositories for security-scripts
Users that are interested in security-scripts are comparing it to the libraries listed below
Sorting:
- Script to automate, manage, and multithread Nikto scans.☆63Updated 5 years ago
- Web Filter External Enumeration Tool (WebFEET)☆77Updated 11 years ago
- WORK IN PROGRESS. Waits for MSF session then automatically gets domain admin☆64Updated 3 years ago
- ☆17Updated 10 years ago
- Open Source - Common Findings DataBase (JSON & MD)☆67Updated 3 years ago
- Provide a shell-like interface for exploiting Remote File Inclusion vulnerabilities.☆46Updated 9 years ago
- ☆81Updated 6 years ago
- Password spraying on sites that require 2+ page loads and dynamic nonces☆32Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆58Updated 8 years ago
- VBA Reversed TCP Meterpreter Stager☆64Updated 7 years ago
- Enterprise WPA Wireless Tool Suite☆87Updated 3 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆55Updated last year
- When CactusTorch meets WebDavDelivery and obfuscation☆63Updated 8 years ago
- Generates a Windows 'vulnerable' machine from ISOs☆91Updated 12 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Updated 8 years ago
- A WebDAV PROPFIND covert channel to deliver payloads☆52Updated 8 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 6 years ago
- One-off scripts☆52Updated 8 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆127Updated 7 years ago
- Custom stagers with python encrypting proxy☆40Updated 10 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 8 years ago
- Search public IP owner through ARIN☆61Updated 7 months ago
- AV Bypass☆29Updated 7 years ago
- ☆51Updated 11 years ago
- InfoPath Phishing Repo Resource☆68Updated 8 years ago
- Empire HTTP(S) C2 redirector setup script☆48Updated 7 years ago
- My pentest cheat sheet☆15Updated 8 years ago
- ☆84Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago