netspooky / uJunkLinks
An unsorted collection of little tools and scripts I've made that don't fit anywhere else
☆19Updated 3 years ago
Alternatives and similar repositories for uJunk
Users that are interested in uJunk are comparing it to the libraries listed below
Sorting:
- Still point in moving world.☆49Updated 3 years ago
- Figlet fonts for crimes☆48Updated 2 years ago
- ☆11Updated 3 years ago
- Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
- Base64 Mutator☆13Updated 4 years ago
- a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
- Code snippets for bare-metal malware development☆98Updated 3 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Updated 2 years ago
- Intro to Assembly Optimization stream repo☆29Updated 4 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆25Updated 4 years ago
- WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
- Nmap and NSE command line wrapper in the style of Metasploit☆43Updated 3 years ago
- king of the hill cybersecurity competition☆31Updated 3 years ago
- DNS server for pentesters☆50Updated 2 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated this week
- A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆59Updated 3 years ago
- A collection of techniques commonly used in malware to accomplish core tasks.☆83Updated 6 years ago
- ☆44Updated 4 years ago
- Ansible scripts to build an attack box☆24Updated 7 years ago
- Fast and intuitive manager for multiple reverse shells☆85Updated last year
- misc scripts/utils that I've written that aren't deserving of own repos.☆14Updated 4 years ago
- Tools that trigger False Positive AV alerts☆53Updated last year
- Grep Web pages with extra features like JS deobfuscation and OCR☆111Updated 2 years ago
- ☆27Updated 3 years ago
- Utility to inject honey tokens into lsass.☆28Updated 8 years ago
- Hackers Don't Give A Shit☆16Updated 5 years ago
- Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆55Updated 5 years ago
- Slide deck for DEF CON 30 - Read Team Village - Offensive Wireless Security presentation☆13Updated 3 years ago
- singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
- Binary Protocol Differ☆118Updated 5 years ago