Scripts to make life easier
☆12Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for RTDevOps
Users that are interested in RTDevOps are comparing it to the libraries listed below
Sorting:
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Digital Forensics and Incident Response Wiki☆40May 19, 2014Updated 11 years ago
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- Revised shell script for parsing .gnmap, .xml, or .nmap port scan results files to a CSV list, lists of IPs per port, web urls, and a sum…☆13Apr 17, 2020Updated 5 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- A simple Commandline Program Developed Using Python3 to make GNU Privacy Guard Program easy to use for beginners.☆10Jan 1, 2025Updated last year
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 5 years ago
- R package for working with data stored within VERIS framework☆13Dec 22, 2015Updated 10 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- ☆11Aug 25, 2018Updated 7 years ago
- Ransomware script based on AES-CBC (Fernet Token) and RSA (PKCS1-OAEP) cryptosystem.☆15Dec 3, 2022Updated 3 years ago
- ☆12Oct 1, 2024Updated last year
- The program is designed to dump full memory of the process by specifing process name or process id.☆41Jul 29, 2019Updated 6 years ago
- Gradio chat interface for FastMLX☆12Sep 22, 2024Updated last year
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- A few Clio examples☆14Oct 11, 2021Updated 4 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- ☆13Oct 30, 2022Updated 3 years ago
- ☆12Dec 15, 2024Updated last year
- ☆10Dec 24, 2022Updated 3 years ago
- A repository of silly scada and ICS knick knack tools.☆12Nov 7, 2017Updated 8 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated 3 weeks ago
- OpenCV builder for iOS platform up to iOS5. Thanks to niw for initial work.☆17Dec 13, 2011Updated 14 years ago
- A Shodan-based tool to discover publicly exposed Ollama instances and list available LLM models.☆20May 27, 2025Updated 9 months ago
- ☆12Nov 15, 2021Updated 4 years ago
- ☆10Aug 24, 2024Updated last year
- Files related to my presentation at SigSegV2 conference in 2019. You can find related papers on my blog☆13Dec 12, 2019Updated 6 years ago
- Wiegand data logger, replay device and micro door-controller☆14Jan 5, 2024Updated 2 years ago
- ☆11Jul 15, 2024Updated last year
- ☆10May 17, 2024Updated last year
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Dash rootkit. Linux Trojan Backdoor. (MALWARE)☆11Apr 3, 2023Updated 2 years ago