netspooky / uJunkLinks
An unsorted collection of little tools and scripts I've made that don't fit anywhere else
☆18Updated 3 years ago
Alternatives and similar repositories for uJunk
Users that are interested in uJunk are comparing it to the libraries listed below
Sorting:
- Figlet fonts for crimes☆46Updated last year
 - Still point in moving world.☆49Updated 3 years ago
 - Intro to Assembly Optimization stream repo☆26Updated 3 years ago
 - Generate very tiny reverse shell binaries for Linux~☆76Updated 5 years ago
 - find historical account IDs for specified twitter @ name using wayback machine captures☆24Updated 4 years ago
 - ☆11Updated 3 years ago
 - Base64 Mutator☆13Updated 4 years ago
 - a cli google client that bypasses captcha and rate limiting by using the google alerts "preview" feature☆48Updated 2 years ago
 - Database of backdoor passwords used by Malware, uncovered by the Malvuln project.☆25Updated last year
 - Code snippets for bare-metal malware development☆98Updated 3 years ago
 - Mirror of my favourite hacking Zines for the lulz, nostalgy, and reference☆53Updated 5 years ago
 - WhiteBeam: Transparent endpoint security☆101Updated 2 years ago
 - Toolset to analyze disks encrypted with McAFee FDE technology☆19Updated 4 years ago
 - PoC to bypass mCaptcha and its rate limiting capabilities from a fully automated bot.☆48Updated 3 years ago
 - Windows 10 De-Clutter script☆25Updated 5 years ago
 - Yet Another Sniffer for monitoring network traffic☆85Updated 4 years ago
 - singe's grep - a fast grep using single-file parallelism☆47Updated 3 years ago
 - Nmap and NSE command line wrapper in the style of Metasploit☆42Updated 3 years ago
 - Ansible scripts to build an attack box☆24Updated 7 years ago
 - Fast and intuitive manager for multiple reverse shells☆86Updated 10 months ago
 - misc scripts/utils that I've written that aren't deserving of own repos.☆14Updated 4 years ago
 - A simple decibel-meter converter that shows an approximate distance to a Wi-Fi device☆40Updated 5 years ago
 - Collection of my slide decks, conference videos and research white papers☆27Updated last month
 - ☆68Updated 3 years ago
 - Self replicating and automatically spreading SSH worm that recovers login credentials☆55Updated 2 years ago
 - Tools that trigger False Positive AV alerts☆53Updated 10 months ago
 - A Proof-of-Concept tool utilizing open DNS resolvers to produce an amplification attack against web servers. Using Shodan APIs and native…☆60Updated 2 years ago
 - ☆29Updated 9 months ago
 - A simple yet beautiful phishing proxy.☆57Updated 4 years ago
 - A cover story generator for people who Need Quick Covers On Operations☆13Updated 5 years ago