Various Python scripts that have come in handy but aren't important enough to get their own repository
☆22Feb 18, 2021Updated 5 years ago
Alternatives and similar repositories for random-python
Users that are interested in random-python are comparing it to the libraries listed below
Sorting:
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Aug 9, 2019Updated 6 years ago
- A multi-processed, multi-threaded scanner to discover web directories on multiple URLs.☆21Nov 15, 2019Updated 6 years ago
- Site for IWS book content☆17Oct 28, 2018Updated 7 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- ☆18Apr 16, 2015Updated 10 years ago
- Cobalt Strike Field Manual - A quick reference for Windows commands that can be accessed in a beacon console.☆46Nov 22, 2017Updated 8 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆35Jan 13, 2023Updated 3 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Useful windows tools for Blue, Red & Purple teams☆11Mar 8, 2026Updated last week
- random notes☆47Jul 9, 2025Updated 8 months ago
- Volatility plugins developed and maintained by the community☆21Sep 18, 2024Updated last year
- Tool searching for different default passwords.☆16Jan 27, 2022Updated 4 years ago
- Unique wordlist generator of unique wordlists.☆41Jul 20, 2023Updated 2 years ago
- Perform OSINT on external targets using Shodan☆23Feb 7, 2024Updated 2 years ago
- A python script that can detect and parse loki-bot (malware) related network traffic. This script can be helpful to DFIR analysts and sec…☆13Dec 31, 2021Updated 4 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- A GC link parser for both linkfiles and jumplists.☆18Oct 28, 2016Updated 9 years ago
- Repo with supporting material for the talk titled "Cracking the Beacon: Automating the extraction of implant configurations"☆11Feb 6, 2025Updated last year
- This chef cookbook provides security configuration for mysql.☆27Updated this week
- SSH Ranking system! :D (re-write of ssh-fail-watcher)☆26Dec 20, 2014Updated 11 years ago
- A PowerShell Logging Module that uses Classes to log to the console, log file, or the event viewer☆13Sep 13, 2018Updated 7 years ago
- Materials for the BSides NoVA/Charleston 2018 Bro Workshop☆14Jun 4, 2025Updated 9 months ago
- BlueSploit is a DFIR framework with the main purpose being to quickly capture artifacts for later review.☆32Jan 1, 2020Updated 6 years ago
- ☆12Jun 28, 2017Updated 8 years ago
- ☆16Apr 21, 2023Updated 2 years ago
- Demo: Using Public/Private keys to make/verify JavaScript Web Tokens (JWT)☆11Aug 19, 2019Updated 6 years ago
- An automation framework for CyberSecurity Tools☆12Dec 6, 2025Updated 3 months ago
- A collection of captured SSH login credentials☆17Mar 28, 2021Updated 4 years ago
- Student-created Linux Binary Exploitation course taught at George Mason University in the Spring and Fall semesters of 2021.☆10Dec 29, 2021Updated 4 years ago
- ☆14Jan 28, 2021Updated 5 years ago
- ☆13May 17, 2016Updated 9 years ago
- Just a bunch of useful scripts for netsec/admin/others☆16Dec 9, 2025Updated 3 months ago
- Some rules, scripts of some use to us☆11Oct 25, 2024Updated last year
- ☆25Updated this week
- INACTIVE - Experiment: A light-weight agent to get a port scan perspective into a useable place/format for security operations☆14Apr 10, 2023Updated 2 years ago
- An attempt at a Packer template to build an HVM Kali AMI that is identical to a Kali install using the official ISO.☆12Aug 31, 2016Updated 9 years ago
- ☆18Feb 14, 2019Updated 7 years ago
- Collection of AWS helper scripts.☆13Jan 15, 2018Updated 8 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago