A collection of scripts made duing my personal research
☆29Sep 27, 2018Updated 7 years ago
Alternatives and similar repositories for Random-Hacking-Scripts
Users that are interested in Random-Hacking-Scripts are comparing it to the libraries listed below
Sorting:
- Hunting for Microsoft Exchange the LDAP Way.☆35Oct 30, 2019Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 7 years ago
- Cheatsheets on security vulnerabilities and exploits.☆34Jan 20, 2020Updated 6 years ago
- Phishing SSH Key Passphrases PoC☆17Mar 29, 2022Updated 3 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Get all AD objects which are hidden from you☆18Aug 21, 2017Updated 8 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Cisco Unfied Call Manager enumeration☆25Jul 13, 2022Updated 3 years ago
- A relatively flexible tool to parse mimikatz output☆35Oct 11, 2016Updated 9 years ago
- ☆24Jun 29, 2020Updated 5 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- OpenCV based IDN option generator PoC☆39Jan 18, 2017Updated 9 years ago
- ☆19May 31, 2017Updated 8 years ago
- Webshell for Razor Syntax (C#)☆19May 5, 2017Updated 8 years ago
- DEFCON-RUSSIA WEB☆12Mar 30, 2021Updated 4 years ago
- Here comes the paintrain!☆11Aug 8, 2016Updated 9 years ago
- Docker Version of Aquatone☆14May 21, 2018Updated 7 years ago
- A PoC .net shell which uses a GitHub.com repository for the communication channel.☆11Oct 25, 2018Updated 7 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Executes common PowerSploit Powerview functions then combines output into a spreadsheet for easy analysis.☆70Jul 26, 2018Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- ☆26Apr 5, 2020Updated 5 years ago
- A remote administration tool that uses Twitch Chat as a Command and Control server.☆12Sep 20, 2019Updated 6 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Burp Commander written in Go☆56Feb 11, 2019Updated 7 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆13Aug 9, 2020Updated 5 years ago
- Pull author and committer names and emails from Travis-CI☆11Aug 9, 2020Updated 5 years ago
- A fully featured Windows backdoor that uses email as a C&C server☆16Aug 19, 2017Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Efficient clustering of MASSCAN results☆12Dec 26, 2016Updated 9 years ago
- Trivial unixey pentest utilities☆56Feb 23, 2024Updated 2 years ago
- This small command allows use a fun ascii arts in commit messages.☆37Jan 27, 2014Updated 12 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- analyze a web-based network traffic 🕶 to detect central command and control servers☆80Jun 30, 2018Updated 7 years ago