Just a collection of scripts
☆40Apr 15, 2020Updated 5 years ago
Alternatives and similar repositories for Scripts
Users that are interested in Scripts are comparing it to the libraries listed below
Sorting:
- A List of InfoSec Resources☆10Jun 12, 2014Updated 11 years ago
- Python Web App to Parse and Track Email and http Pcap Files.☆54Jul 14, 2013Updated 12 years ago
- officefileinfo is a python script to help analyse the newer Microsoft Office file formats. There are numerous tools for dealing with the …☆16Apr 28, 2016Updated 9 years ago
- Parses for Google Analytic values in raw files like RAM, DD images etc.☆18Apr 17, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/reverse-engineering-scripts☆18Apr 13, 2015Updated 10 years ago
- Web based Manager for Yara Rules☆58Mar 9, 2020Updated 6 years ago
- Library for Object Linking and Embedding (OLE) data types☆12Nov 27, 2025Updated 3 months ago
- openioc_scan Volatility Framework plugin☆44Feb 25, 2016Updated 10 years ago
- Random scripts for log mining, intel gathering, network querying, and other incident response-ish activities☆16Sep 13, 2022Updated 3 years ago
- cuckoo sandbox patches and scripts☆15Jan 30, 2014Updated 12 years ago
- Plugins written for CVE-Search☆27Apr 16, 2021Updated 4 years ago
- Exploit kit analyzer☆22Mar 3, 2015Updated 11 years ago
- misc scripts☆35Oct 23, 2018Updated 7 years ago
- ☆16Jan 31, 2015Updated 11 years ago
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 2 months ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- Volatility Plugins☆22May 1, 2015Updated 10 years ago
- cuckoo-1.1 fork with suricata/moloch/clamav and other goodies☆23Feb 17, 2015Updated 11 years ago
- This module installs and configures MISP (Malware Information Sharing Platform)☆14Mar 6, 2026Updated last week
- A collection of hex utilities in python☆14Mar 1, 2013Updated 13 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆12May 11, 2015Updated 10 years ago
- Library and tools to access the Windows (Vista/7) Explorer thumbnail cache database format (thumbcache.db)☆17Dec 3, 2025Updated 3 months ago
- Scripts and Modules for forensical analyses of mysql database systems☆22Sep 19, 2014Updated 11 years ago
- Maltego Local Transforms for truepeoplesearch.com☆12Jun 5, 2017Updated 8 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A set of codecs for python that are useful to have for CTF or general hacking.☆35Sep 2, 2018Updated 7 years ago
- Helper script for BloodHound to automatically add relationships between multiple accounts owned by the same individual☆14Jul 13, 2022Updated 3 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Normalizer for honeypot data.☆46Jun 19, 2015Updated 10 years ago
- FWRF is a open source tool for firmware web-side analysis.☆11Aug 27, 2015Updated 10 years ago
- ☆27Mar 1, 2022Updated 4 years ago
- This is a basic example of how to search into Shodan using the ShodanAPI.☆16Jan 19, 2014Updated 12 years ago
- Exploit Research & Development - Ported Exploits☆11Jul 22, 2017Updated 8 years ago
- Example of a serverless web reconaissance workflow's AWS architecture.☆11Feb 25, 2023Updated 3 years ago
- Local Maltego Transforms for crt.sh☆12Sep 8, 2017Updated 8 years ago
- Kibana app for RedELK☆18Mar 19, 2023Updated 3 years ago
- Archive from the article CVE-2015-5119 Flash ByteArray UaF: A beginner's walkthrough☆13Sep 10, 2015Updated 10 years ago
- A collection of shellcodes☆70May 17, 2012Updated 13 years ago