Python Prototype Scripts to Exploit or Discover Network vulnerabilities and misconfiguration.
☆19Apr 6, 2024Updated last year
Alternatives and similar repositories for Network_Hacking_Scripts
Users that are interested in Network_Hacking_Scripts are comparing it to the libraries listed below
Sorting:
- Reference implementation of reuse of UITableViewCell objects containing Mapbox GL-based Mapbox iOS SDK maps.☆11Sep 2, 2015Updated 10 years ago
- A world-scale AR demo☆12Dec 4, 2018Updated 7 years ago
- Gesture-based drawing overlay view☆17Aug 12, 2019Updated 6 years ago
- Webhood is a privately hosted URL scanner used by threat hunters and security analysts for analyzing phishing and malicious sites.☆31Oct 7, 2024Updated last year
- SSH & FTP brute-forcing tool written in python☆11Oct 2, 2024Updated last year
- A plug-and-play iOS app that cuts down on the set-up and development time needed to add a Store Locator into your app. Use our starter th…☆19Jul 20, 2020Updated 5 years ago
- IOCs and detection script for COATHANGER malware☆55Feb 7, 2024Updated 2 years ago
- Subdomains scanner Spider☆13Feb 29, 2024Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Dec 2, 2024Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Mar 8, 2024Updated 2 years ago
- External recon toolkit☆55Dec 29, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- Tool for bypassing logins vulnerable against SQL injection☆46Apr 3, 2024Updated last year
- Python tool to find vulnerable AD object and generating csv report☆26Jul 4, 2022Updated 3 years ago
- ☆29Aug 25, 2020Updated 5 years ago
- Keyboard‑driven terminal app to view and manage users and groups. Browse accounts, see memberships, search, and make common changes: rena…☆24Nov 11, 2025Updated 4 months ago
- Brute forcing login pages with SQL Injection queries with cURL☆17Feb 23, 2023Updated 3 years ago
- Provides an advanced baseline to implement a secure Windows auditing strategy on Windows OS.☆63Feb 22, 2026Updated 3 weeks ago
- MacroExploit use in excel sheet☆20Jun 12, 2023Updated 2 years ago
- A PHP application that monitors websites for changes and delivers them as a unified diff via RSS☆11Aug 18, 2016Updated 9 years ago
- ☆27Mar 2, 2022Updated 4 years ago
- A utility for detecting webpage inputs and conducting XSS scans.☆160May 5, 2024Updated last year
- ShellSweeping the evil.☆181Nov 25, 2024Updated last year
- Generalized service engine that auto provisions REST, GraphQL & gRPC services that support CRUD operations with full validation to tables…☆12Mar 6, 2026Updated last week
- Example WebRTC video chat app☆27Feb 5, 2018Updated 8 years ago
- A secure offline desktop application for generating and managing TOTP 2FA codes. Features encrypted vault storage, modern cryptography (A…☆29Jan 28, 2026Updated last month
- PrestaXSRF is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆31Dec 26, 2023Updated 2 years ago
- mini context toolbar in editor for Obsidian☆15Aug 4, 2023Updated 2 years ago
- A Python script that helps generate a Fortigate script to add multiple address objects and also creates an address object group for them☆12Jan 31, 2021Updated 5 years ago
- A port of classic netcat to C#☆34Jan 21, 2023Updated 3 years ago
- Dynamically generate system information for MOTD SSH banner☆13Aug 4, 2025Updated 7 months ago
- ☆105Jul 31, 2024Updated last year
- ☆15May 3, 2024Updated last year
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- Rename multiple ebook files based on available embedded metadata (pure ruby implementation version)☆10Mar 17, 2018Updated 8 years ago
- Ubuntu 24.04 CIS Benchmark Hardening Script☆32Jan 23, 2026Updated last month
- Single file php webshell scanner to detect potentially malicious backdoor based on token and hash with web interface☆79Mar 12, 2026Updated last week
- Scans a list of raccoon servers from Tria.ge and extracts the config☆15Jun 5, 2023Updated 2 years ago
- Real-time detection and defense against malicious network activity and policy violations (exploits, port-scanners, advertising, telemetry…☆26Dec 8, 2025Updated 3 months ago