☆12Dec 31, 2022Updated 3 years ago
Alternatives and similar repositories for Scritp-New_Year
Users that are interested in Scritp-New_Year are comparing it to the libraries listed below
Sorting:
- An Advanced PHP Cryptography Framework☆16Feb 12, 2024Updated 2 years ago
- Discord Scripts☆12Nov 30, 2019Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Jan 12, 2026Updated last month
- This "Automotive Cybersecurity Career Roadmap" is tailored for individuals aspiring to build expertise in automotive cybersecurity.☆21Jan 3, 2025Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- AliGuard PHP WAF☆12Feb 16, 2024Updated 2 years ago
- DoS attack, Ataque DoS a redes Wifi, herramienta capaz de Expulsar a todos los usuarios de una red Wifi dejandolos sin acceso a internet.☆11Oct 28, 2020Updated 5 years ago
- Thawne is a Sentinel for your Program. A trojan that Reinfects systems. It installs itself on the system it's Executed on. After which Th…☆10Oct 13, 2020Updated 5 years ago
- Slack integration for MagicMirror²☆10Sep 9, 2020Updated 5 years ago
- The C-based Firmware Patching Framework for Broadcom/Cypress WiFi Chips that enables Monitor Mode, Frame Injection and much more☆12Oct 4, 2018Updated 7 years ago
- ☆18Jul 30, 2017Updated 8 years ago
- macos-collector - Automated Collection of macOS Forensic Artifacts for DFIR☆29Jan 29, 2026Updated last month
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Upload, save and run keystroke injection payloads with an ESP8266 + ATMEGA32U4☆12Aug 14, 2019Updated 6 years ago
- ☆13Oct 24, 2016Updated 9 years ago
- ☆18Jan 2, 2018Updated 8 years ago
- Sn0ffer - Make sound/noise/music with your network connection!☆20Jul 1, 2016Updated 9 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆13Jun 13, 2020Updated 5 years ago
- Phishing Campaign Toolkit☆11Mar 15, 2020Updated 5 years ago
- ☆10Jan 8, 2018Updated 8 years ago
- Resources from the Security Presentation☆13Oct 29, 2024Updated last year
- Threat Hunt Investigation Methodology and Procedure☆15Jul 11, 2022Updated 3 years ago
- Cyber Offenders are related CDR/IPDRs are very important for LEAs, the given CDR/IPDR data is in a Spreadsheet/Excel/CSV/Notepad (Rows & …☆18Aug 4, 2020Updated 5 years ago
- ☆13Aug 13, 2017Updated 8 years ago
- The leaderboard web app displays the top scoring player on the fictional game of life. It also allows any player to submit their score. A…☆13Apr 1, 2022Updated 3 years ago
- It scraps instagram followers information.☆14Dec 10, 2020Updated 5 years ago
- ☆14Jan 6, 2022Updated 4 years ago
- 🐊 A small Password Attack☆15Apr 1, 2024Updated last year
- A collection of handy Bash One-Liners and terminal tricks for data processing and Linux system maintenance.☆15Jul 19, 2020Updated 5 years ago
- Automated version of CVE-2018-14847 (MikroTik Exploit)☆15Jun 12, 2025Updated 8 months ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- Hacker101 is a free class for web security. Whether you're a programmer with an interest in bug bounties or a seasoned security professio…☆11Jun 25, 2018Updated 7 years ago
- Hack Cameras CCTV FREE☆17Aug 22, 2021Updated 4 years ago
- ☆13Feb 14, 2020Updated 6 years ago
- BruteForce SSH Login Credentials much Faster...!...Bring the Thunder of Asgard to SSH☆18May 2, 2024Updated last year
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- WRecon is an open source no intussive web scanner. It is designed to discover all URL in a website recursively, without using bruteforce …☆19Oct 23, 2020Updated 5 years ago
- ☆18Dec 23, 2024Updated last year
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago