stens-sec / autokeyView external linksLinks
Useful scripts for autokey
☆29Oct 28, 2020Updated 5 years ago
Alternatives and similar repositories for autokey
Users that are interested in autokey are comparing it to the libraries listed below
Sorting:
- ☆18Oct 14, 2020Updated 5 years ago
- Buffer Overflows☆28Jan 30, 2021Updated 5 years ago
- LDAP Enumeration Tool☆13Mar 28, 2024Updated last year
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 4 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- ☆168Oct 21, 2023Updated 2 years ago
- Shell Please 1.0 : Reverse shell code generator.☆36Jul 3, 2022Updated 3 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆33Jan 14, 2023Updated 3 years ago
- Scripts I have made for blue team☆16Apr 1, 2018Updated 7 years ago
- Exploit codes for rconfig <= 3.9.4☆12Mar 17, 2020Updated 5 years ago
- ☆38Feb 5, 2025Updated last year
- Raspberry Pi night vision goggle code. python code that creates a side by side stero view (steroscopic) from a single camera☆13May 8, 2021Updated 4 years ago
- Blogs, Tools and other available resources for source code review.☆10Nov 18, 2021Updated 4 years ago
- ADE: automates Active Directory enumeration for labs (Hack The Box, Hack Smarter, TryHackMe, Proving Grounds) and exam prep (OSCP, CPTS).☆28Jan 19, 2026Updated 3 weeks ago
- Multi-protocol credential validation tool with spray and no-spray modes for penetration testing.☆12Jan 4, 2026Updated last month
- Encryption using 2 Factor Authentication through an external drive with Python☆12Jun 7, 2020Updated 5 years ago
- Writeups of some of PicoCTF 2017 challenges.☆10Aug 3, 2018Updated 7 years ago
- Analysis of techniques used by Conti ransomware affiliates from their leaked manuals.☆19Aug 29, 2021Updated 4 years ago
- wew oscp☆280Jun 28, 2022Updated 3 years ago
- Spartan is a powerful and versatile network scanning tool designed to help system administrators and security professionals identify vuln…☆17Feb 11, 2025Updated last year
- Awesome apps for users switching from the Mac to Linux☆12Apr 23, 2020Updated 5 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- ☆11Jan 23, 2021Updated 5 years ago
- Open source HIDS tailored for Microsoft Windows and Active Directory☆29Updated this week
- a simple powershell wrapper to automate checking a user's access around the network☆13Dec 5, 2023Updated 2 years ago
- KCSEC Rubber Ducky Tookit☆11Jul 12, 2018Updated 7 years ago
- A Chrome Extension to bypass Medium paywall☆13Mar 23, 2024Updated last year
- ☆97Feb 18, 2025Updated 11 months ago
- Pentest report framework without data send☆19Sep 23, 2025Updated 4 months ago
- inspec rules for STIGs☆15Dec 4, 2016Updated 9 years ago
- Automate the regular transfer of AIS data into a MISP Server☆10Jun 5, 2024Updated last year
- A powershell script that performs reflective parent process ID (PPID) spoofing and process hollowing to evade Windows Defender☆11Feb 17, 2023Updated 2 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Open source alternative to Burpsuite☆15May 18, 2021Updated 4 years ago
- Training scenarios for cyber ranges☆14Apr 24, 2020Updated 5 years ago
- ☆12Sep 29, 2021Updated 4 years ago
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stack☆12Apr 18, 2020Updated 5 years ago
- An Open Source KoTH Platform☆12Jul 19, 2023Updated 2 years ago
- This tool is used to generate Offensive Security Exploit Developer (OSED) exam report. This is a modified version of https://github.com/n…☆14Jan 19, 2025Updated last year