Malicious scripts made for testing purposes, use it legally!
☆39Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for Malicious-Scripts
Users that are interested in Malicious-Scripts are comparing it to the libraries listed below
Sorting:
- عطها لستة ارقام وتعطيك اساميهم☆10Apr 19, 2021Updated 4 years ago
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- ☆13Aug 13, 2017Updated 8 years ago
- Login application with password encryption☆15Dec 20, 2023Updated 2 years ago
- This project aims to capture network traffic on a local network, filter out packets related to WhatsApp calls, and extract the public IP …☆25Jan 21, 2025Updated last year
- Code repository for Raspberry Pi for Secret Agents Third Edition, published by Packt☆12Jan 14, 2021Updated 5 years ago
- Web Hacking Tools☆15Feb 26, 2022Updated 4 years ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- Proxy Tools and Grabbers☆17May 25, 2022Updated 3 years ago
- Reverse Shell Using JavaScript & XSS☆36Jun 4, 2018Updated 7 years ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 4 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Bash script that creates directories and files to organize a pentesting☆12May 26, 2021Updated 4 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- Facebook Group Admin Takeover☆27Oct 3, 2024Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Services from training sessions of A&D season☆12Jun 1, 2021Updated 4 years ago
- GitHub Profile Repository for Kali☆14Feb 26, 2026Updated 3 weeks ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- JS canvas base sine wave animation☆14Mar 30, 2018Updated 7 years ago
- A small deauth script written in ruby that uses "Packetgen" to send deauth packets to a client on a network☆15Mar 10, 2021Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- the Open Source Windows Privilege Escalation Guide☆10Mar 16, 2017Updated 9 years ago
- small cli scripts to dump & manage some ctf tasks☆13Nov 9, 2024Updated last year
- PowerShell module containing commands to easily interact with the Cybereason API.☆16Jan 4, 2026Updated 2 months ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 8 months ago
- Easy Port Scanner with Python☆14Dec 3, 2021Updated 4 years ago
- Hacking Software For Windows☆20Dec 19, 2021Updated 4 years ago
- Code for the Arduino for the Secret Agents book☆14Sep 12, 2015Updated 10 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Large public A&D training on 2018-11-04☆23Jun 1, 2021Updated 4 years ago
- ☆25Jul 16, 2022Updated 3 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago
- Enter Product Key Volatile Environment LPE☆13Jun 28, 2025Updated 8 months ago