jgstew / toolsLinks
various scripts and tools
☆24Updated last month
Alternatives and similar repositories for tools
Users that are interested in tools are comparing it to the libraries listed below
Sorting:
- Open-source Exploiting Framework☆30Updated 8 years ago
- A utility to force query DNS over DoH off of CloudFlare API when DNS block is in place☆10Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Brute force password selection for EAP-MD5 authentication exchanges☆23Updated 8 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- A defense tool - detect web shells in local directories via md5sum☆33Updated 6 years ago
- SWF Vulnerability & Information Scanner☆19Updated 6 years ago
- Enumerates users based off RDP Screenshots☆34Updated last year
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- ☆18Updated last year
- Cloud metadata extraction tools and scripts☆34Updated 2 years ago
- A collection of modifed PowerShell Scripts for CrackMapExec (https://github.com/byt3bl33d3r/CrackMapExec)☆52Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Updated 10 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 6 years ago
- hassh-utils: Nmap NSE Script and Docker image for HASSH - the SSH client/server fingerprinting method (https://github.com/salesforce/hass…☆59Updated 10 months ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 4 years ago
- A simple backdoor in (ba)sh with encrypted communication channel☆27Updated 8 years ago
- shellcode are codes designed to be injected into the memory space of another process during exploitation.☆49Updated 4 years ago
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 5 years ago
- A utility for password spraying using kerberos from an untrusted/non-domain joined Kali linux host. Useful for user and KDC/DC enumeratio…☆19Updated last year
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Updated 7 years ago
- Exploitation Tool For Windows Using Batch and Powershell☆22Updated 8 months ago
- Open Standard Vulnerability & Compliance Scanner☆45Updated 9 years ago
- Downloads shellcode over HTTP and executes in memory. Now with threading! Rejoice!☆21Updated 9 years ago
- [PHP][Python] Root Exploiter – No Back-Connect☆10Updated 3 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆12Updated 5 years ago