General scripts
☆32Apr 19, 2018Updated 7 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Explains how to setup a omnibus full gitlab-ce (git, registry, pages) with HTTPS and Let's Encrypt certificates☆10Jan 4, 2022Updated 4 years ago
- Bukkit plugin which allows nerfing Phantom mobs introduced in Minecraft 1.13☆10Jul 1, 2024Updated last year
- HiddenVM is a futuristic tool powered by KVM designed to combine the powerful amnesic nature of Tails and the impenetrable design of Whon…☆11Jul 22, 2022Updated 3 years ago
- SuperNES - Super Nmap Easy Scanner☆10Oct 2, 2018Updated 7 years ago
- Use taskset to pin a virtual machine's process to a specific set of CPU cores in Proxmox.☆13Oct 22, 2021Updated 4 years ago
- A multi-threaded port scanner implementation in Python☆12May 30, 2023Updated 2 years ago
- Paper/Folia plugin to find groups of entities and tile entities. Ideal to detect XP farms or pesky hopper sorter!☆17Nov 13, 2025Updated 4 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Phoenix based exploit kit for educational purpose.☆17Dec 2, 2018Updated 7 years ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆18Mar 25, 2023Updated 2 years ago
- Ability is a browser extension that helps people with varying degrees of ability have more control over their browsing experience.☆22Sep 24, 2025Updated 5 months ago
- Useful Splynx, Mikrotik router OS and Linux scripts☆19Feb 6, 2026Updated last month
- Wall of Flippers is designed to find Flipper Zero devices using BLE (Bluetooth Low Energy)☆11Jan 16, 2026Updated 2 months ago
- *Abandoned* Decentralized messenger for Android, which work on top of TomP2P DHT.☆10May 23, 2019Updated 6 years ago
- SQL Injection – Attack and Defense Strategies, published by Packt☆16Jan 30, 2023Updated 3 years ago
- ☆15Apr 14, 2023Updated 2 years ago
- End to end system on recognition of Handwritten Math Symbols☆12Aug 27, 2016Updated 9 years ago
- Python scripts to maintain Monero opennodes DNS records☆19Mar 10, 2024Updated 2 years ago
- crawler for finding reflected parameters and reflecting special characters!☆21Dec 2, 2024Updated last year
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- WhatsApp forensics analysis and acquisition utility☆26Apr 2, 2013Updated 12 years ago
- Shock the shell! Exploit many injection method for shellshock☆18Sep 3, 2018Updated 7 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- A python tool to test for web cache poisoning denial of service (CPDoS) vulnerabilities.☆15Oct 19, 2023Updated 2 years ago
- A standalone addon for GnuPG☆17Nov 25, 2018Updated 7 years ago
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆45Nov 2, 2025Updated 4 months ago
- Гайд по нетсталкингу☆16Oct 13, 2019Updated 6 years ago
- A vulnerable honeypot setup using Flask and SSH to capture and analyze malicious activities. Includes real-time logging and monitoring to…☆14Dec 13, 2024Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- Ansible role for security standards compliance☆13Mar 6, 2019Updated 7 years ago
- ETM enables the creation of detailed attack graphs and figures while calculating the risk associated with your attack narratives. ETM was…☆26Mar 3, 2023Updated 3 years ago
- Get the urls for all disclosed vulnerabilities☆17Dec 29, 2015Updated 10 years ago
- Telegram bot for an Instagram engagement group/pod.☆11May 13, 2020Updated 5 years ago
- ☆10Nov 19, 2019Updated 6 years ago
- A solution to prototype or create themes for Nuxt using tailwind.css framework☆11Jan 29, 2026Updated last month
- ☆14Apr 29, 2016Updated 9 years ago
- Interactive sip toolkit for packet manipulations, sniffing, man in the middle attacks, fuzzing, simulating of dos attacks.☆78Dec 17, 2015Updated 10 years ago
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Solver for 1D nonlinear partial differential equations in Julia based on the collocation method of Skeel and Berzins and providing an API…☆15Aug 5, 2024Updated last year