Some simple and useful tools
☆15May 8, 2018Updated 7 years ago
Alternatives and similar repositories for mytools
Users that are interested in mytools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- everything that does not fit elsewhere☆12Dec 27, 2017Updated 8 years ago
- PowerShell scripts for the PoshSec Framework☆22Aug 18, 2014Updated 11 years ago
- Position and velocity PID control of a DC motor using LabView and Arduino☆15Apr 23, 2018Updated 7 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- ☆36Oct 5, 2016Updated 9 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- ☆20Oct 14, 2013Updated 12 years ago
- My presentations from different conferences☆15Sep 12, 2018Updated 7 years ago
- Lab and supplemental content for AWS re:Inforce 2019 session SEP315☆13Feb 28, 2022Updated 4 years ago
- A Catalog of Application Whitelisting Bypass Techniques☆11Jul 14, 2017Updated 8 years ago
- ZeroDay Cyber Research - ZCR Shellcoder Archive - z3r0d4y.com Shellcode Generator☆13Jul 29, 2016Updated 9 years ago
- A C# implementation of the PowerShell Empire Agent☆74Apr 22, 2019Updated 6 years ago
- ☆12Nov 22, 2016Updated 9 years ago
- Keyjacker enumerates Mac keychains and displays plain text passwords.☆23Sep 25, 2017Updated 8 years ago
- Debian and Red Hat packaging for SIE DNS sensor☆15May 5, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Incident Response Plan for all major incidents including cheatsheets for both linux and windows☆13Jun 4, 2020Updated 5 years ago
- Automatically send sms messages using Google Voice☆11Dec 4, 2017Updated 8 years ago
- lterm is a small script built to install a bash hook for full terminal logging.☆57Dec 3, 2016Updated 9 years ago
- HackSys Extreme Vulnerable Driver - ArbitraryOverwrite Exploit using GDI☆42Feb 13, 2017Updated 9 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- Microsoft Windows support to DCOS☆12Nov 1, 2018Updated 7 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Apr 3, 2017Updated 8 years ago
- A password cracking IRC bot☆18May 24, 2014Updated 11 years ago
- ☆15Apr 12, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- ☆14May 20, 2020Updated 5 years ago
- This is a list of scripts I created while formerly working at Drexel University. These scripts were released with permission.☆16Oct 18, 2020Updated 5 years ago
- A module for working with McAfee EPO API☆14Dec 31, 2019Updated 6 years ago
- A PoC botnet that uses image files distributed via Twitter for a command and control channel.☆19Jan 29, 2012Updated 14 years ago
- Ansible role to configure redirectors for red team C2☆30Nov 12, 2018Updated 7 years ago
- "Repeater" style XSS post-exploitation tool for mass browser control. Primarily a PoC to show why HttpOnly flag isn't a complete protecti…☆14Mar 4, 2017Updated 9 years ago
- Shell wrapper with keylogger (local log or syslog)☆13Nov 1, 2017Updated 8 years ago
- web based nmap scan collection and search☆19May 13, 2021Updated 4 years ago
- Colllect landing page☆19Jun 6, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A PowerShell function to report admnistrative events☆16Mar 10, 2017Updated 9 years ago
- Stuff like scripts or tools for Microsoft System Center Configuration Manager☆18Oct 15, 2021Updated 4 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 9 years ago
- first commit☆24Feb 16, 2026Updated last month
- Burp suite HTTP history advanced search☆10Mar 20, 2018Updated 8 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- tools for analyzing strings from password lists☆59Aug 15, 2022Updated 3 years ago