Malicious scripts made for testing purposes, use it legally!
☆39Jan 10, 2024Updated 2 years ago
Alternatives and similar repositories for Malicious-Scripts
Users that are interested in Malicious-Scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Networking Tools for Calculations & Scans☆12Dec 11, 2023Updated 2 years ago
- CodeX Tool is to Convert Phishing URL to qr code !☆16Feb 16, 2021Updated 5 years ago
- عطها لستة ارقام وتعطيك اساميهم☆10Apr 19, 2021Updated 5 years ago
- Fast PyQt5 Youtube download application☆11Dec 27, 2024Updated last year
- Applications & Tools developed in Python☆37Mar 9, 2026Updated last month
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- d_5tr☆10Aug 26, 2021Updated 4 years ago
- Python syntax & use of different modules with explanations☆68Dec 16, 2024Updated last year
- Black Nurse DOS attack☆69Oct 30, 2017Updated 8 years ago
- Login application with password encryption☆15Dec 20, 2023Updated 2 years ago
- Hatch is a brute force tool that is used to brute force most websites☆89Mar 1, 2024Updated 2 years ago
- ☆14Jan 8, 2024Updated 2 years ago
- Todas as Lives que fizermos para aprender Nest.JS usarão este repositório.☆18Jan 24, 2023Updated 3 years ago
- an efficient feature complete C++ bittorrent implementation☆14Apr 15, 2026Updated 2 weeks ago
- Collections of Tools, Bookmarks, and other guides created to aid in OSINT collection☆18Aug 18, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆14Jul 2, 2020Updated 5 years ago
- C++ Privilege Escalation Class to execute Process As Admin from User and Process as NT AUTHORITY SYSTEM from Admin☆23Aug 21, 2023Updated 2 years ago
- Web Hacking Tools☆15Feb 26, 2022Updated 4 years ago
- Ruby ARP Toolkit☆14Apr 15, 2021Updated 5 years ago
- Component Services Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 6 years ago
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- Facebook Group Admin Takeover☆27Oct 3, 2024Updated last year
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- A small deauth script written in ruby that uses "Packetgen" to send deauth packets to a client on a network☆15Mar 10, 2021Updated 5 years ago
- A python program to exploit android through ADB☆17Apr 30, 2021Updated 4 years ago
- Open the queue on the side of your Spotify client.☆13Aug 4, 2023Updated 2 years ago
- Display Languages Volatile Environment LPE☆12Jun 28, 2025Updated 10 months ago
- LikeIt allows to like a web page ¯\_(ツ)_/¯☆10Apr 26, 2024Updated 2 years ago
- Notebooks for docarray, Jina, Finetuner, and other products from Jina AI☆12Mar 31, 2022Updated 4 years ago
- Hacking Software For Windows☆20Dec 19, 2021Updated 4 years ago
- Playing around with node.js☆12Nov 15, 2021Updated 4 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Self-organized P2P ride sharing community☆12Dec 3, 2024Updated last year
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- various wrappers and functions over dictionary to add functionalities.☆13Feb 14, 2026Updated 2 months ago
- Large public A&D training on 2018-11-04☆24Jun 1, 2021Updated 4 years ago
- Ursa Major theme for rEFInd Bootloader☆15Apr 22, 2021Updated 5 years ago
- Tool to enumerate potential security misconfigurations, allowing for privilege escalation on a windows machine.☆11Nov 22, 2019Updated 6 years ago