Useful scripts for autokey
☆29Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for autokey
Users that are interested in autokey are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Oct 14, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated 2 years ago
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆38Feb 5, 2025Updated last year
- ☆48Nov 14, 2021Updated 4 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- Burp Suite JSON/JS-Beautifier☆14Sep 17, 2019Updated 6 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- ☆97Feb 18, 2025Updated last year
- Exploit codes for rconfig <= 3.9.4☆11Mar 17, 2020Updated 6 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- wew oscp☆284Jun 28, 2022Updated 3 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆119Feb 16, 2025Updated last year
- ☆15Sep 11, 2020Updated 5 years ago
- Generate Large Language Model text in a container.☆20Mar 24, 2023Updated 3 years ago
- A port of BHIS's Backdoors & Breaches for playingcards.io☆64Jan 26, 2023Updated 3 years ago
- CipherRun is an ethical hacking tool used to execute shellcode easily while bypassing antivirus solutions.☆11Jan 30, 2024Updated 2 years ago
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- ☆14Dec 2, 2020Updated 5 years ago
- ☆14Jul 1, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- This repository contains a Python script to automate the process of testing for a vulnerability known as Text4Shell, referenced under the…☆14Jun 27, 2023Updated 2 years ago
- ☆18Jun 18, 2021Updated 4 years ago
- Lots of POC Codes & Preparation materials, scripts, discovery processes in there.☆16Feb 8, 2024Updated 2 years ago
- Battery Pack, based on L3HARRIS BATTERY POWER SUPPLY☆20Jan 21, 2023Updated 3 years ago
- rcracki_mt : used to perform a rainbow table attack on password hashes☆13Sep 25, 2015Updated 10 years ago
- Open-Source PowerShell module to allow online play of Backdoors & Breaches card game devised by Black Hills Information Security☆56Mar 13, 2021Updated 5 years ago
- This Script installs useful tools and stuff for pen-testing purpose.☆37Dec 28, 2020Updated 5 years ago
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Reflective shellcode runners using obfuscated Win32 APIs in C# and C++ (GetProcAddress & GetModuleHandle). For penetration testing.☆16Jul 17, 2025Updated 9 months ago
- ☆16Jul 14, 2020Updated 5 years ago
- ☆28Oct 26, 2021Updated 4 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- Check the Domain for Local Admin Access☆20Feb 20, 2025Updated last year
- Content for cyber defense course☆14Oct 15, 2014Updated 11 years ago
- Book for Pentesting format pdf☆22Mar 25, 2022Updated 4 years ago