Useful scripts for autokey
☆29Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for autokey
Users that are interested in autokey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Oct 14, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆168Oct 21, 2023Updated 2 years ago
- ☆38Feb 5, 2025Updated last year
- ☆48Nov 14, 2021Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- ☆97Feb 18, 2025Updated last year
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆119Feb 16, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- wew oscp☆281Jun 28, 2022Updated 3 years ago
- ☆15Sep 11, 2020Updated 5 years ago
- Generate Large Language Model text in a container.☆20Mar 24, 2023Updated 3 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Jan 26, 2023Updated 3 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- A Chrome Extension to bypass Medium paywall☆13Mar 23, 2024Updated 2 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- ☆14Jul 1, 2021Updated 4 years ago
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆15Feb 8, 2024Updated 2 years ago
- Battery Pack, based on L3HARRIS BATTERY POWER SUPPLY☆20Jan 21, 2023Updated 3 years ago
- This Script installs useful tools and stuff for pen-testing purpose.☆37Dec 28, 2020Updated 5 years ago
- PoC RCE Reverse Shell for CVE-2020-0796 (SMBGhost)☆11Jun 5, 2020Updated 5 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆15Jul 17, 2025Updated 8 months ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- This small repo contain OSCP public resources. You can download this on your Google Chrome with the following steps.☆19Dec 31, 2020Updated 5 years ago
- ☆21Feb 14, 2022Updated 4 years ago
- A complete guide on how to setup Matrix's Synapse software on Debian 10 on its own domain.☆23Jun 23, 2020Updated 5 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Nov 21, 2020Updated 5 years ago
- ☆16Jul 14, 2020Updated 5 years ago
- Exploit for CVE-2022-26134: Confluence Pre-Auth Remote Code Execution via OGNL Injection☆13Jul 24, 2022Updated 3 years ago
- A series of PowerShell scripts to automate collection of forensic artefacts in most Incident Response environments☆65Jan 31, 2022Updated 4 years ago