☆47Sep 3, 2025Updated 8 months ago
Alternatives and similar repositories for scripts-tools-shells
Users that are interested in scripts-tools-shells are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 9 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 8 years ago
- TLS SNI virtual hosts bruteforcer☆22Aug 26, 2014Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- mtr-geoip = mtr + geoip = ping + traceroute + geoip☆10Feb 10, 2017Updated 9 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 9 months ago
- ☆30Jul 17, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Linux Kernel Module Debugger☆15Sep 27, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- bash script to facilitate some aspects of an Android application assessment☆159Sep 9, 2021Updated 4 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆53Jan 17, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆20Jan 13, 2018Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 8 months ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- ☆23Oct 14, 2013Updated 12 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago
- Ludus role for deploying a Mythic Teamserver onto Linux servers☆23Mar 16, 2025Updated last year
- utilities☆15Jul 2, 2013Updated 12 years ago
- Convert a list of IP addresses/ranges to their minimized cidr form☆39May 27, 2015Updated 10 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago