netspooky / uJunk
An unsorted collection of little tools and scripts I've made that don't fit anywhere else
☆17Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for uJunk
- Still point in moving world.☆50Updated 2 years ago
- Distributed Nmap, wrapper around Nmap to allow distributed network enumeration.☆14Updated last year
- ☆10Updated 2 years ago
- find historical account IDs for specified twitter @ name using wayback machine captures☆21Updated 3 years ago
- quality of life☆18Updated 4 years ago
- Figlet fonts for crimes☆40Updated 9 months ago
- Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆26Updated 2 weeks ago
- Passive OS detection based on SYN packets without Transmitting any Data☆45Updated last year
- Read Registry.pol files on Linux, or anywhere Python runs!☆12Updated last year
- Windows SandBox environment for cybersecurity enthusiasts☆30Updated last year
- ☆26Updated 2 years ago
- WMI SA stuffs☆29Updated 2 years ago
- Tools that trigger False Positive AV alerts☆43Updated last year
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆23Updated last year
- Base64 Mutator☆12Updated 3 years ago
- ☆15Updated 3 months ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- A rust utility for instrumenting binaries, used in Holiday Hack Challenge 2021☆26Updated 2 years ago
- Custom Binary Ninja Themes☆12Updated last year
- Detect & filter duplicate hashcat rules☆41Updated 2 years ago
- This is the official repository for Basic Malware Analysis Course☆19Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 4 years ago
- A visualized overview of the Initial Access Broker (IAB) cybercrime landscape☆107Updated 3 years ago
- misc scripts/utils that I've written that aren't deserving of own repos.☆12Updated 3 years ago
- king of the hill cybersecurity competition☆27Updated 2 years ago
- Self replicating and automatically spreading SSH worm that recovers login credentials☆42Updated last year
- Vigrid is a Cyber Range redesign of the GNS3 tool able to virtualize almost any physical device on many CPU. It is also able to virtualiz…☆21Updated this week
- Utility to inject honey tokens into lsass.☆27Updated 7 years ago
- Hashes of infamous malware☆25Updated last year