Scripts written by Steve Stonebraker for Administration
☆24Oct 5, 2023Updated 2 years ago
Alternatives and similar repositories for braker-scripts
Users that are interested in braker-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scripts created to use with the OSCP exercises☆47Aug 6, 2022Updated 3 years ago
- Suggests programs to run against services found during the enumeration phase of a Pentest☆116Oct 25, 2025Updated 5 months ago
- ☆12Feb 1, 2017Updated 9 years ago
- Collection of Scripts that leverage the okta powershell module☆26May 14, 2021Updated 4 years ago
- Download all the HIBP passwords☆12Apr 6, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- EPSScall☆11Jun 10, 2022Updated 3 years ago
- Designed for automated enumeration for ethical hacking and penetration testing☆11Jan 17, 2018Updated 8 years ago
- S3 Buckets that will let you list all files inside them☆14Apr 26, 2018Updated 7 years ago
- A Python Script that, when run, checks your Plex server for recently added and summarizes the entries within the time frame you specify. …☆12Jun 20, 2021Updated 4 years ago
- auto install and carck pritunl and pihole☆20Jun 2, 2023Updated 2 years ago
- Persistent memory system for agentic AI via MCP - remember, recall, forget with semantic search with knowledge graph☆32Feb 15, 2026Updated last month
- An URL shortener written in Python using the Flask framework☆35Apr 26, 2012Updated 13 years ago
- Several scripts are based on the Netlas.io search engine. They will allow you to carry out the reconnaissance phase before the pen test i…☆49May 22, 2025Updated 10 months ago
- Universal Windows Driver information for ITPros and UHFT (UWD HSA Fix Tool).☆12Apr 26, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆16Apr 16, 2015Updated 10 years ago
- A multi-thread m3u8 hls downloader☆12Sep 10, 2020Updated 5 years ago
- Static Media Agent for Plex☆10Nov 25, 2020Updated 5 years ago
- A VimWiki Graph Generator☆16Oct 7, 2023Updated 2 years ago
- ☆12Jan 4, 2023Updated 3 years ago
- A collection of scripts for use with CrowdStrike Falcon RTR☆19Oct 4, 2024Updated last year
- Easy to extend initial access scenario to help with EDR testing on Linux and Mac☆26Mar 20, 2022Updated 4 years ago
- Lockstitch is an incremental, stateful cryptographic primitive for symmetric-key cryptographic operations (e.g. hashing, encryption, mess…☆12Feb 5, 2026Updated last month
- Minimal Windows Service Template for demonstrating privilege escalation via weak service executable permissions☆14Nov 13, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆12Nov 19, 2018Updated 7 years ago
- This small script helps to avoid using MetaSploit (msfconsole) during the Enterprise pentests and OSCP-like exams. Grep included function…☆14Mar 9, 2023Updated 3 years ago
- This plugin will check a lot of different values on your Synology DiskStation.☆19Jun 5, 2024Updated last year
- Various commands, tools, techniques that you can use to examine live Windows systems for signs of Compromise or for Threat Hunting.Can al…☆15Aug 15, 2022Updated 3 years ago
- An attempt to port https://github.com/Swizec/react-fractals/ into Vue☆30Feb 6, 2020Updated 6 years ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 5 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Exploit Dev Wiki☆13Dec 29, 2013Updated 12 years ago
- This script will generate hashes (MD5, SHA1, SHA256), submit the MD5 to Virus Total, and produce a text file with the results.☆15Jul 13, 2023Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Sep 1, 2018Updated 7 years ago
- Bash Strict Mode☆27Feb 16, 2026Updated last month
- insta-onion: Create a Tor Onion service in 20 seconds☆14Apr 12, 2020Updated 5 years ago
- Dump Microsoft Portable Executable (PE) Files Information☆15Dec 13, 2025Updated 3 months ago
- ☆20Mar 21, 2024Updated 2 years ago
- Nemo - An offensive Remote Access Tool & Post-Exploitation Framework (WIP).☆14Apr 25, 2023Updated 2 years ago
- Windows log and threat hunting with powershell☆16Dec 11, 2020Updated 5 years ago