A collection of scripts made duing my personal research
☆29Sep 27, 2018Updated 7 years ago
Alternatives and similar repositories for Random-Hacking-Scripts
Users that are interested in Random-Hacking-Scripts are comparing it to the libraries listed below
Sorting:
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Cisco Unfied Call Manager enumeration☆24Jul 13, 2022Updated 3 years ago
- ☆19May 31, 2017Updated 8 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆14Aug 9, 2020Updated 5 years ago
- Simulates a logged in user.☆16Jul 10, 2024Updated last year
- Cheatsheets on security vulnerabilities and exploits.☆35Jan 20, 2020Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- ☆15Jan 26, 2023Updated 3 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Dec 7, 2018Updated 7 years ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- SandBox-Dumper makes use of multiple private libraries to provide exact locations of the application sandbox, application bundle and some…☆58May 13, 2021Updated 4 years ago
- Generic malicious browser check written in C#☆13Jul 18, 2016Updated 9 years ago
- Simple Aggressor Scripts for Cobalt Strike☆13Sep 24, 2020Updated 5 years ago
- ☆113Jun 12, 2017Updated 8 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Burp Commander written in Go☆56Feb 11, 2019Updated 7 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Investigation of the core VPN technologies | Penetration testing of an IPsec-VPN (using Ike-scan and psk-crack) | MitM Attack on PPTP-VPN…☆16May 15, 2016Updated 9 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆71Jul 26, 2018Updated 7 years ago
- A tool to collect secrets (keys and passwords) and stage (compress and encrypt) them for exfiltration.☆61Jun 2, 2018Updated 7 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago