Statically Compiled Tools that could be used in engagements
☆17Aug 29, 2022Updated 3 years ago
Alternatives and similar repositories for tools-repo
Users that are interested in tools-repo are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- An example of a vulnerable slack bot that runs in AWS lambda.☆19Jul 15, 2017Updated 8 years ago
- Atomic Red Team Simple Parser☆13Sep 21, 2018Updated 7 years ago
- Deploy redteam infrastructure☆17Mar 9, 2021Updated 5 years ago
- Linux rust keylogger☆17Mar 1, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- The all-in-one hacking toolbox for hardware penetration testing.☆18Jun 4, 2024Updated last year
- FruityProxy allows MITM attacks. MITMproxy inline scripts can be imported. It is possible to set an upstream proxy. FruityProxy is part o…☆14Jan 6, 2019Updated 7 years ago
- Darkbit Cloud Security Tools☆25Nov 12, 2020Updated 5 years ago
- Scripts for Pentesting☆14May 29, 2025Updated 10 months ago
- Command and Control that uses NTP as the transport protocol.☆25Jan 29, 2022Updated 4 years ago
- An automated scanning, enumeration, and note taking tool for pentesters☆13Jul 26, 2022Updated 3 years ago
- Read a plist file, write out any embedded plist files☆36Dec 27, 2015Updated 10 years ago
- A PowerShell module for monitoring network links using iPerf.☆19Mar 9, 2020Updated 6 years ago
- sample configs showing how to colorize the output of nmap☆14Mar 25, 2021Updated 5 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Resources to learn cloud environment and pentesting the same, contains AWS, Azure, Google Cloud☆56Mar 7, 2022Updated 4 years ago
- PowerShell commands for managing Windows Admin Center☆18Jun 5, 2019Updated 6 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Some of my custom "tools".☆27Feb 21, 2022Updated 4 years ago
- Tiny C Compiler☆16Apr 28, 2016Updated 9 years ago
- Social Engineering Abusing Google App Scripts☆24Jan 13, 2026Updated 3 months ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆25Aug 1, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Opsec considerations for each AWS GuardDuty finding type.☆24Oct 29, 2020Updated 5 years ago
- Cron-like system based on Nextdoor Scheduler, PyBots and Tinyscript☆15Dec 3, 2023Updated 2 years ago
- ☆33Oct 17, 2014Updated 11 years ago
- A template for writing a nice master thesis dissertation with LaTeX☆14Jun 17, 2025Updated 10 months ago
- Whois for the Cloud: Recon tool for cloud provider attribution. Supports AWS, Azure, Google, Cloudflare, and Digital Ocean.☆182Oct 9, 2025Updated 6 months ago
- Simple PoC from Malicious Payload Injection from Windows Event Log Entry☆28Aug 8, 2022Updated 3 years ago
- Scripts and things.☆13Jan 23, 2026Updated 2 months ago
- Repository for doing pen300 exercises☆25Oct 21, 2022Updated 3 years ago
- ☆23Jul 5, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- CVE-2021-42287/CVE-2021-42278 exploits in powershell☆38Apr 4, 2022Updated 4 years ago
- ☆16May 20, 2022Updated 3 years ago
- Modified SuperTuxKart to support sending CANBus messages☆12Dec 9, 2014Updated 11 years ago
- A curated list of awesome resources for tracking vulnerabilities in software☆19May 4, 2017Updated 8 years ago
- Searches for interesting cached DNS entries.☆56May 15, 2014Updated 11 years ago
- Forensics triage tool relying on Volatility and Foremost☆25Dec 3, 2023Updated 2 years ago
- Import python libraries over HTTP☆13Oct 28, 2024Updated last year