Useful scripts for autokey
☆29Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for autokey
Users that are interested in autokey are comparing it to the libraries listed below
Sorting:
- ☆18Oct 14, 2020Updated 5 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆168Oct 21, 2023Updated 2 years ago
- Learn MongoDB from absolute basics.☆56Jan 16, 2026Updated last month
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- The classic launcher, evolved. Fast, Go-based command library equipped with 200+ cybersecurity cheat-sheets. Just install and start hacki…☆94Feb 27, 2026Updated last week
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Feb 27, 2026Updated last week
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 5 years ago
- Make your work more comfortable.☆11May 17, 2019Updated 6 years ago
- ☆38Feb 5, 2025Updated last year
- Dismiss The Overlay☆12Feb 27, 2021Updated 5 years ago
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Retain your privacy while torrenting, even if your VPN connection is lost.☆10Apr 23, 2019Updated 6 years ago
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Burp extension to decode NTLM SSP headers and extract domain/host information☆12Mar 25, 2021Updated 4 years ago
- Mindmap/CheatSheet for eLearnSecurity-PTPv5☆10Jun 18, 2020Updated 5 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- A curated list of nonsensical websites.☆12Mar 2, 2017Updated 9 years ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆14Jan 4, 2026Updated 2 months ago
- ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).☆28Jan 19, 2026Updated last month
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- YouTube Playlist Enhancer extension for Chrome☆11Jan 22, 2018Updated 8 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 5 months ago
- A super-powered clipboard manager for browsers.☆10Jan 23, 2025Updated last year
- ☆48Nov 14, 2021Updated 4 years ago
- wew oscp☆280Jun 28, 2022Updated 3 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Feb 13, 2026Updated 3 weeks ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- A Chrome Extension to bypass Medium paywall☆13Mar 23, 2024Updated last year
- Zenected Threat Defense VPN☆13Apr 28, 2017Updated 8 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Create machine images containing the Nessus vulnerability scanner☆13Feb 24, 2026Updated last week
- WebExtensions port of Link Properties Plus extension for Firefox☆13Sep 5, 2020Updated 5 years ago