Some useful tools and scripts
☆47Feb 11, 2023Updated 3 years ago
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Exploit using barcodes, QRcodes, earn13, datamatrix☆116Apr 15, 2016Updated 10 years ago
- ☆26Oct 14, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- All-in-one plugin for Burp Suite for the detection and the exploitation of Java deserialization vulnerabilities☆11Jan 27, 2017Updated 9 years ago
- All Security Engineering Resources☆15Feb 2, 2018Updated 8 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- pgp.ustc.edu.cn deployment☆10Mar 25, 2019Updated 7 years ago
- Write-ups for various CTF challenges solved by the team☆16Oct 6, 2017Updated 8 years ago
- A repo of fake committed secrets to test tools that find committed secrets ([dont submit for BB :-) ]☆11Mar 22, 2018Updated 8 years ago
- ☆17Apr 21, 2017Updated 9 years ago
- The autoexpect of pwntools☆18Feb 10, 2019Updated 7 years ago
- Created on 10th August 2017. Purpose of this Project is to note down every useful object I gained during the time I spent working on OSCP…☆19Feb 26, 2018Updated 8 years ago
- Network Guardian☆12Jun 29, 2017Updated 8 years ago
- 一款基于subDomainsBrute子域名爆破工具结果的处理脚本☆10Jul 28, 2017Updated 8 years ago
- Abusing fts3_tokenizer☆12Jan 18, 2016Updated 10 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Christian Buchner's & Christian H.'s CUDA miner project☆12Jul 22, 2014Updated 11 years ago
- Common Wordlists☆58Aug 26, 2016Updated 9 years ago
- WooYun Network Scanner☆47Apr 24, 2020Updated 6 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Nov 6, 2017Updated 8 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- 🏴 Collection of CTF solutions☆74Apr 7, 2019Updated 7 years ago
- PowerShell module for the exploitation and testing☆16Jul 5, 2015Updated 10 years ago
- Ansible Automatic deployment Mattermost on Linux☆10Jan 4, 2022Updated 4 years ago
- Various exploits☆10Apr 27, 2017Updated 9 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- shARP_2.0 is an updated version for shARP with more options for better performance.☆12Oct 12, 2017Updated 8 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 4 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Scans the internet for open FTP servers looking for common malware bot droppers and grabs them for sampling. Also provides support for up…☆49Feb 15, 2017Updated 9 years ago
- Encrypt, decrypt, and break caesar's cipher.☆10Jun 18, 2021Updated 4 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Jan 5, 2022Updated 4 years ago
- 专为 devops 而生,30s 内部署一个生产级别的应用,通过 web 部署 helm 应用。☆19Mar 11, 2026Updated 2 months ago
- The frontend for Aurora Admin Panel☆14Apr 21, 2022Updated 4 years ago
- buffer overflow examples☆24Dec 20, 2017Updated 8 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- Decrypt all saved Chrome passwords☆43Dec 17, 2013Updated 12 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆15Jan 9, 2019Updated 7 years ago
- A collection of Nagios plugins that we package.☆41Mar 22, 2016Updated 10 years ago
- Identify the different types of hashes used to encrypt passwords.☆10Mar 12, 2017Updated 9 years ago
- 多线程网站目录穷举扫描修改版☆26Jun 17, 2016Updated 9 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago