One off Scripts repo
☆24Jan 20, 2023Updated 3 years ago
Alternatives and similar repositories for SCRIPTS
Users that are interested in SCRIPTS are comparing it to the libraries listed below
Sorting:
- A standalone version of the JMX tool of JBoss AS☆30Jun 5, 2025Updated 8 months ago
- Native Java-based deserialization exploit for WebLogic T3 (and T3S) listeners.☆35Mar 2, 2020Updated 6 years ago
- The successor to reDuh, pwn a bastion webserver and create SOCKS proxies through the DMZ. Pivot and pwn.☆19Apr 9, 2018Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- yet another web fingerprinter☆14Nov 30, 2017Updated 8 years ago
- This is a Java program that exploits Spring Break vulnerability (CVE-2017-8046).☆17Jun 4, 2021Updated 4 years ago
- Proof-of-Work Hashcash demo☆18Dec 29, 2015Updated 10 years ago
- ERPScan Public POC for CVE-2018-2636☆22Feb 1, 2018Updated 8 years ago
- Scans crossdomain.xml policies for expired domain names.☆26Aug 4, 2015Updated 10 years ago
- Group Policy Hijacking☆32Apr 6, 2018Updated 7 years ago
- Build a markdown table of contents for all the markdown files in a given directory tree.☆21May 25, 2022Updated 3 years ago
- RCE Exploit PoC for XMLDecoder☆63Aug 1, 2013Updated 12 years ago
- Searches open files shares for password files, database backups, etc. Extend as you see fit☆29Dec 13, 2019Updated 6 years ago
- JMSDigger is JMS API basedEnterprise Messaging Application assessment tool☆30Aug 6, 2014Updated 11 years ago
- PoC code for CVE-2019-0841 Privilege Escalation vulnerability☆243Apr 9, 2019Updated 6 years ago
- 通过NetSessionEnum获取域内机器对应用户☆67May 6, 2020Updated 5 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Dec 23, 2017Updated 8 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Aug 29, 2016Updated 9 years ago
- cobalt strike 自用脚本☆29Oct 29, 2020Updated 5 years ago
- MWO Issue Tracker☆17Aug 22, 2017Updated 8 years ago
- Telegram bot utilizing OpenAI's GPT to generate presentations and abstracts in PPTX and DOCX formats.☆10Jan 10, 2024Updated 2 years ago
- In this work, we compared the predictive capabilities of six different machine learning algorithms - linear regression, random forest, ex…☆15Sep 21, 2020Updated 5 years ago
- A brute force program to test weak accounts configured to access a JMX Registry☆35Feb 1, 2017Updated 9 years ago
- absolute safe code☆27Mar 20, 2017Updated 8 years ago
- CVE-2018-8174_python☆141Apr 19, 2022Updated 3 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Files to make FFXI Beautiful☆10Jan 9, 2022Updated 4 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Dec 18, 2017Updated 8 years ago
- Make XSS Great Again☆31Nov 29, 2019Updated 6 years ago
- Redis Unauthorized☆33Nov 13, 2015Updated 10 years ago
- Scan for open S3 buckets and dump☆38Feb 23, 2018Updated 8 years ago
- API Automation Testing Via Playwright☆10Aug 9, 2023Updated 2 years ago
- Python tool for exploiting CVE-2021-35616☆11Dec 3, 2021Updated 4 years ago
- A Node-RED node to increment a count.☆10Sep 22, 2023Updated 2 years ago
- Malifar is a GPU-accelerated NSEC3 DNS zone dumper☆14Jun 4, 2024Updated last year
- A collection of open source and commercial tools that aid in red team operations.☆13Jun 14, 2018Updated 7 years ago
- Metasploit Framework with Viproy installed.☆36Mar 15, 2017Updated 8 years ago
- Where I keep my config files for other to look at and use☆12May 27, 2021Updated 4 years ago
- 🤗 Transformers: State-of-the-art Machine Learning for Pytorch, TensorFlow, and JAX.☆10Nov 19, 2024Updated last year