Scripts to make life easier
☆12Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for RTDevOps
Users that are interested in RTDevOps are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Read-only Slack RTM API CLI for monitoring teams☆10Mar 18, 2019Updated 7 years ago
- Slides for the talk we presented as UniPi at DefCon's Red Team Village☆23Aug 14, 2022Updated 3 years ago
- LotusCMS 3.0 eval() Remote Command Execution☆14Feb 10, 2013Updated 13 years ago
- I collect writeup about analysis CVEs and Exploits on the Windows in this repository.☆23Jun 8, 2022Updated 3 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- A cross-platform Nim implant for Prelude Operator☆31Jan 2, 2022Updated 4 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆21Aug 29, 2022Updated 3 years ago
- The program is designed to dump full memory of the process by specifing process name or process id.☆41Jul 29, 2019Updated 6 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Oct 9, 2020Updated 5 years ago
- This repository is a collection of my malicious VBA projects.☆119Feb 13, 2021Updated 5 years ago
- Simple S3 Bucket Testing Software☆31Nov 4, 2021Updated 4 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Bash one-liner that will parse harmj0y's SharpRoast or Rebeus kerberoast into hashcat crack-able format.☆32Feb 28, 2019Updated 7 years ago
- My Personal Reading lists for CVE Writeups☆38Feb 10, 2022Updated 4 years ago
- Markov-chains for linguistically-correct password cracking☆63Mar 15, 2022Updated 4 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- A curated list of awesome binary analysis automation training, resources, and tools.☆59Apr 21, 2024Updated 2 years ago
- Check for know iframeBuster XSS☆12Sep 25, 2024Updated last year
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Attempt to connect to and dump all tables within a ServiceNow instance.☆20Jul 4, 2023Updated 2 years ago
- ☆28Aug 9, 2020Updated 5 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- Sound Research SECOMN service Privilege Escalation (windows 10)☆39Mar 17, 2020Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 8 years ago
- This repo contains code of JScript .NET which can be used as alternative to csc.exe to run potentially malicious code, which ships in all…☆13Nov 8, 2019Updated 6 years ago
- PowerShell script that gathers data about logons and logoffs from Event Logs.☆12Aug 2, 2013Updated 12 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- DNS over HTTPS Servers☆13Nov 19, 2018Updated 7 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated 2 months ago
- Manual JavaScript Linting is a Bug☆48Mar 6, 2021Updated 5 years ago
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆12Nov 19, 2018Updated 7 years ago