byt3bl33d3r / tobyView external linksLinks
Recursively searches a directory for any file containing a specified string
☆48Jul 5, 2015Updated 10 years ago
Alternatives and similar repositories for toby
Users that are interested in toby are comparing it to the libraries listed below
Sorting:
- Converts a command to a base64 powershell compatible string☆27Jul 31, 2014Updated 11 years ago
- Sniffs an interface/pcap file and concatenates fragmented packet loads☆22Feb 26, 2015Updated 10 years ago
- WPA/WPA2 autopwn script that parses captured handshakes and sends them to the Crackq☆32Mar 21, 2015Updated 10 years ago
- Send mail with handlebars like templates☆25Dec 2, 2019Updated 6 years ago
- Find websites with script URLs matching given regex☆11Apr 11, 2015Updated 10 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Jul 16, 2020Updated 5 years ago
- Automatically exported from code.google.com/p/jamaal-re-tools☆13Oct 4, 2015Updated 10 years ago
- pwning & info gathering via user browser☆39May 7, 2015Updated 10 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- A ruby self contained, low resource consuming HTTP transparent proxy designed for the WiFi Pineapple MKV.☆17Jun 29, 2015Updated 10 years ago
- Some NSE scripts to search information from routers☆10Nov 18, 2015Updated 10 years ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- Repository aimed to compile scripts and tools that can be used during penetration tests to assess the security of different flash related…☆10Jan 5, 2015Updated 11 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- h00k☆13Jul 28, 2016Updated 9 years ago
- Scripts used for phishing campaigns☆14Aug 18, 2014Updated 11 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Multi-mode wireless LAN Based on a Software Access point for Kali Linux.☆54Sep 22, 2018Updated 7 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 11 years ago
- Find a useable IP address to use☆30Jul 4, 2014Updated 11 years ago
- Quick & Dirty DFIR scripts developed by Ebryx DFIR team to keep handy during field assignment☆14Jan 7, 2026Updated last month
- Useful pentesting scripts☆86Feb 1, 2025Updated last year
- It is the Distributed Version of Thug, by which all systems across the world running thug will get connect. Then URLs will be distributed…☆24Jan 5, 2016Updated 10 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆14Feb 9, 2015Updated 11 years ago
- Scrape google search results☆94Aug 24, 2018Updated 7 years ago
- DNS traffic indexer and analyzer☆26Oct 7, 2014Updated 11 years ago
- Vagrant configuration to setup a Thug honeyclient VM☆20Feb 26, 2015Updated 10 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- Just another Process Injection using Process Hollowing technique.☆19Sep 18, 2023Updated 2 years ago
- Race condition vulnerability example source code.☆12Nov 11, 2015Updated 10 years ago
- Semantic SSH RSA keys☆25Feb 25, 2014Updated 11 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆26Jan 29, 2018Updated 8 years ago
- Modular command-line threat hunting tool & framework.☆17Jul 20, 2020Updated 5 years ago
- Searches for interesting cached DNS entries.☆55May 15, 2014Updated 11 years ago
- Opens 1K+ IPs or Shodan search results and attempts to login☆148Jan 30, 2021Updated 5 years ago
- Wireless Miniaturized Device☆19Jan 27, 2018Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 9 years ago
- Phishing e-mail repository☆36Apr 7, 2020Updated 5 years ago
- Spoofs a DHCP server and exploits all clients vulnerable to the 'ShellShock' bug☆87Mar 27, 2019Updated 6 years ago