☆47Sep 3, 2025Updated 6 months ago
Alternatives and similar repositories for scripts-tools-shells
Users that are interested in scripts-tools-shells are comparing it to the libraries listed below
Sorting:
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- ☆13Nov 24, 2019Updated 6 years ago
- Tools for NTDS.dit☆17Apr 26, 2018Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆22Aug 26, 2014Updated 11 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- apbleed☆23Jun 6, 2014Updated 11 years ago
- mtr-geoip = mtr + geoip = ping + traceroute + geoip☆10Feb 10, 2017Updated 9 years ago
- Write simple security regression tests for your network infrastructure.☆19Jul 4, 2012Updated 13 years ago
- Java Untrusted Deserialization Exploits Tools☆67Dec 13, 2015Updated 10 years ago
- meow☆12Dec 6, 2015Updated 10 years ago
- Some of the presentations given by me☆19Aug 8, 2025Updated 7 months ago
- ☆30Jul 17, 2018Updated 7 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- Linux Kernel Module Debugger☆15Sep 27, 2016Updated 9 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆94Aug 30, 2016Updated 9 years ago
- miscellaneous security research stuff☆37Jul 16, 2019Updated 6 years ago
- bash script to facilitate some aspects of an Android application assessment☆159Sep 9, 2021Updated 4 years ago
- Converts burp's sitemap to sulley's fuzzing script☆11Aug 30, 2015Updated 10 years ago
- Proof of concept implementation of fuzzing workload using AFL as the fuzzer and Terraform to codify infrastructure☆31Aug 22, 2019Updated 6 years ago
- Discovery is a powerful PowerShell module that lets you probe the inner depths of the operating system.☆16Jul 26, 2014Updated 11 years ago
- Windows privilege escalation through NTLM Relay and NBNS Spoofing☆52Jan 17, 2016Updated 10 years ago
- HackSys Extreme Vulnerable Driver - Various Windows 7 x86 Kernel Exploits☆22Jan 13, 2018Updated 8 years ago
- This is a source mirror for 0trace.☆12Mar 4, 2014Updated 12 years ago
- print syntax highlighted file to terminal☆13Jun 29, 2015Updated 10 years ago
- ☆13Oct 3, 2023Updated 2 years ago
- An extension for Burp's Web Vulnerability Scanner that can detect API discovery metadata and extract data useful during recon.☆19Sep 13, 2025Updated 6 months ago
- Sonicwall Firewall decoder, username, password hash extract. Formats into John the Ripper☆25Jul 4, 2014Updated 11 years ago
- Bypass WiFi client isolation on Open and WPA2-PSK networks☆40Oct 14, 2025Updated 5 months ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- Hodor! Fuzzer..☆129Aug 31, 2016Updated 9 years ago
- A wrapper around jq, to help you parse jq output!☆30Aug 23, 2020Updated 5 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆34Sep 19, 2016Updated 9 years ago
- Kernel function hooking using exception tables☆28Jun 15, 2018Updated 7 years ago
- Wireless regulatory database for CRDA☆14Aug 1, 2014Updated 11 years ago
- ☆15May 3, 2024Updated last year
- A simple SOCKS5 server written in Go☆31Nov 7, 2016Updated 9 years ago
- Axis2 RPC Shell☆15Sep 10, 2015Updated 10 years ago