One off Scripts repo
☆24Jan 20, 2023Updated 3 years ago
Alternatives and similar repositories for SCRIPTS
Users that are interested in SCRIPTS are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- Proof-of-Work Hashcash demo☆18Dec 29, 2015Updated 10 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 8 years ago
- Metasploit Framework☆31Jan 30, 2020Updated 6 years ago
- yet another web fingerprinter☆14Nov 30, 2017Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- safe_tools☆26Nov 27, 2017Updated 8 years ago
- Kubernetes Kubelet RCE Automated Script. Utilizes both "run" and "exec" debug handlers.☆10Sep 28, 2020Updated 5 years ago
- A simple PHP implementation of the Instagram Basic Display API☆10Feb 21, 2020Updated 6 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- PHP library for normalizing URLs☆16Apr 3, 2013Updated 13 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- PoC for Scala and Groovy☆14Apr 4, 2016Updated 10 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- A .Net Core MVC webshell☆11Sep 8, 2018Updated 7 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆34Mar 2, 2020Updated 6 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- php-cs-fixer config for REDAXO☆10Mar 15, 2026Updated 3 weeks ago
- ☆10Jun 1, 2014Updated 11 years ago
- ☆24Feb 12, 2016Updated 10 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 8 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- VulHint是辅助代码审计的 sublime text 3 插件☆67Nov 8, 2018Updated 7 years ago
- absolute safe code☆27Mar 20, 2017Updated 9 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- Beef hook OWA / Outlook☆12Mar 27, 2019Updated 7 years ago
- 通过NetSessionEnum获取域内机器对应用户☆67May 6, 2020Updated 5 years ago
- Responsive HTML tables - automatically shift headers to the side and stack - works great with UIKit☆10Sep 10, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Document tracing and tracking. Dracker lets you "tag" documents with a phone home call when MS Word documents are opened. This applicatio…☆14Mar 26, 2014Updated 12 years ago
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- APT34/OILRIG leak☆11Jun 25, 2019Updated 6 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆242Apr 9, 2019Updated 7 years ago