littleniche / scriptsLinks
π§ Automation scripts
β14Updated 2 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- Various Crypter Projectβ10Updated 11 years ago
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bountyβ14Updated 4 years ago
- CRACK AND CHECK HASH TYPES IN BULKβ13Updated 4 years ago
- Scripts to help automate tedious red teaming enumeration and tasks.β17Updated 5 years ago
- Free Email Providersβ11Updated 2 years ago
- Spider or repeater to find all links.β11Updated 4 years ago
- MITM to Capture FTP Credentialsβ14Updated 3 years ago
- The Hall of Ancient Exploitation Toolsβ16Updated 6 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)β16Updated 2 years ago
- Travel And Tourism - Database web Application Implemented using Flask framework, Sqlalchemy, Html,Css,Js.β10Updated 4 years ago
- A collection of tools adversaries commonly use in an attack.β14Updated 11 months ago
- buffer overflow examplesβ22Updated 7 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentestingβ15Updated 9 months ago
- Python script that automate the process of generating various reverse shells.β16Updated 4 years ago
- Various exploitsβ10Updated 8 years ago
- Tools, scripts and tips useful during OSINT investigations and reconnaissance.β13Updated 4 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.β18Updated 4 years ago
- A python based utility to download animes for offline viewing Β―\(γ)/Β―β13Updated 4 years ago
- β10Updated 3 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based oβ¦β14Updated 2 years ago
- This Shell script can create a chrooted environment along with a SSH Jail for the same. This can be used either for a single user jail orβ¦β19Updated 8 years ago
- Solution to SIH 22 problem statement Smart Attendanceβ10Updated 2 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary libβ¦β16Updated 3 years ago
- β19Updated last year
- This is a simple network scanner used to scan any range of IP Address to get their MAC Address. The code is written completely in Python β¦β23Updated 4 years ago
- Large collection of collaboratively developed Tutorials, created and maintained by the awesome developers across the globeβ48Updated 2 months ago
- Exactly what it sounds like, which is something radβ22Updated 3 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target sβ¦β16Updated 2 months ago
- Linux/x86 - Egghunter Reverse TCP Shell dynamic IP and port Shellcodeβ13Updated 4 years ago
- Simple and efficient file shreddingβ14Updated 6 years ago