kevthehermit / ScriptsLinks
Just a collection of scripts
☆40Updated 5 years ago
Alternatives and similar repositories for Scripts
Users that are interested in Scripts are comparing it to the libraries listed below
Sorting:
- A short and small memory forensics helper.☆52Updated 8 years ago
- hemingway is a simple and easy to use spear phishing helper.☆42Updated 8 years ago
- ssh session type for metasploit☆100Updated 2 years ago
- Digital Forensics and Incident Response Wiki☆40Updated 11 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Phishing e-mail repository☆38Updated 5 years ago
- Parses Java Cache IDX files☆39Updated 7 years ago
- Based on the Volatility framework, this script will run various plugins as well as create a timeline, or use YARA/ClamAV/VirusTotal to fi…☆48Updated 8 years ago
- Leak File Analyzer☆62Updated 7 years ago
- Automated HaveIbeenPwned lookups using theharvester results☆50Updated 7 years ago
- Local privilege escalation scripts and tools☆17Updated 9 years ago
- Collection of single use scripts I worte for windows forensics☆27Updated 13 years ago
- Passive recon / OSINT automation script☆39Updated 6 years ago
- Tool for analysts to perform simultaneous lookups (IP, Domain, URL, MD5) against multiple data sources☆29Updated 8 years ago
- Fast Evidence Collector Toolkit is an incident response toolkit to collect evidences on a suspicious windows computer☆42Updated 5 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- GUI Tool to generate threat intelligence information in various formats☆44Updated 7 years ago
- Python tool and library to help analyze files during malware triage and analysis.☆78Updated 5 years ago
- DNS Enumeration and Reconnaissance Tool☆36Updated 9 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Updated 5 years ago
- PowerShell Empire module for logging USB keystrokes via ETW☆32Updated 8 years ago
- Network Forensics Workshop Files☆17Updated 10 years ago
- my little bucket to store the delusions of grandeur I write in python :D☆30Updated 11 years ago
- Intelligent threat hunter and phishing servers☆48Updated 6 years ago
- SensePost's network footprinting and enumeration tool. You can't pwn what you don't know about.☆43Updated 10 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 7 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- Yara intergrated into BurpSuite☆48Updated 9 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆42Updated 8 years ago