Quick and dirty scripts for pentesting.
☆41Jun 12, 2020Updated 5 years ago
Alternatives and similar repositories for LazyScripts
Users that are interested in LazyScripts are comparing it to the libraries listed below
Sorting:
- rShellZ s a linux reverse-shell & exploitation assistance framework. With lots of payload and post exploitation modules.☆14Dec 13, 2023Updated 2 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- USB-Rubber-Ducky-Arduino-New-Payloads☆14Oct 26, 2018Updated 7 years ago
- FEBREV venom is a RAT generator tool to create Android RATs through metasploit , signs the RAT apk , and sends the RAT apk to the victim…☆16Aug 13, 2019Updated 6 years ago
- ☆15Sep 21, 2019Updated 6 years ago
- a collection of pdfs i like to read☆25May 25, 2023Updated 2 years ago
- Tools for baiting phone-tech-support-scammers☆23Apr 20, 2020Updated 5 years ago
- A compilation of scambaiting resources☆22Jun 6, 2022Updated 3 years ago
- ☆24Nov 18, 2023Updated 2 years ago
- Automatically exported from code.google.com/p/ra2-dom-xss-scanner☆28Jan 4, 2016Updated 10 years ago
- A project for web scraping one of the most prolific job sites for information concerning certifications you should pursue for your releva…☆31Nov 9, 2023Updated 2 years ago
- Security test tool for Blind XSS☆26Mar 5, 2020Updated 5 years ago
- Bait bank created for scambaiting☆31May 28, 2020Updated 5 years ago
- Notes for the PJPT exam!☆14Aug 8, 2024Updated last year
- examples of plugins for use by Coursera partners☆13Jun 18, 2025Updated 8 months ago
- CVE-2024-21306 BadBlue implementation (Using DuckyScript)☆10Jul 11, 2024Updated last year
- Crawler based on a modified browser to detect online tracking.☆11Jul 19, 2023Updated 2 years ago
- Postman collections for interacting with Cisco Stealthwatch Enterprise APIs☆10Apr 26, 2023Updated 2 years ago
- Examples of Selenium in Python☆11Jun 11, 2018Updated 7 years ago
- This is a script to import Cisco Talos's IP Blacklist into a Tag (Host Group) within Stealthwatch. This will also optionally create a Cu…☆11May 22, 2023Updated 2 years ago
- ☆10Oct 18, 2024Updated last year
- Collection of exploits developed by your friendly clown☆15Oct 18, 2025Updated 4 months ago
- Before using Emagnet, please remember that with great power comes great responsibility.☆22Mar 30, 2025Updated 11 months ago
- ☆40Jan 7, 2022Updated 4 years ago
- CLI for rendering text with headless chrome.☆11Jul 11, 2020Updated 5 years ago
- RSA cracking algorithm based on Pollard factorization (Pollard's p-1 method).☆15Jun 28, 2023Updated 2 years ago
- ☆41May 22, 2024Updated last year
- CRACK AND CHECK HASH TYPES IN BULK☆13Jul 28, 2021Updated 4 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- PDump is a project for dumping leaked credentials from DEHASHED☆17Jan 21, 2024Updated 2 years ago
- Quick and dirty script to parse bplists with Ruby☆13Oct 29, 2020Updated 5 years ago
- Restoring some of my older tools to the web☆12Oct 18, 2024Updated last year
- ICU-WP is a Flask-based WordPress username enumeration tool. It detects WordPress sites and uses methods like author URL checks, REST API…☆14Jan 17, 2025Updated last year
- Tool to try multiple paths for PHPunit RCE CVE-2017-9841☆11May 19, 2020Updated 5 years ago
- Whether you're a seasoned expert or a beginner, Kali GPT helps streamline your workflow, making penetration testing more efficient and ac…☆20Feb 9, 2026Updated 3 weeks ago
- The NSE Script plugin integrates with Criminal IP CTI search engine for network scanning, showing IP details like WHOIS, running products…☆15Nov 29, 2023Updated 2 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Simple web based Messaging app built with Nodejs.☆16Feb 1, 2023Updated 3 years ago