A collection of various scripts I've written through the years
☆68Dec 2, 2022Updated 3 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of rules and debug data for hashcat☆25Dec 2, 2025Updated 3 months ago
- ☆20Apr 21, 2020Updated 5 years ago
- The Zonefile Transfer Toolkit☆28Mar 3, 2025Updated last year
- An injector to load dynamic libraries into other processes' memory☆22Sep 3, 2017Updated 8 years ago
- HackRF Toolkit☆15Sep 26, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- Tools for cross-compiling linux kernels for the Next Thing Co. Pocket CHIP using docker.☆15Sep 22, 2020Updated 5 years ago
- ☆13Mar 4, 2023Updated 3 years ago
- Holding place for my security and threat news RSS list☆15Jan 13, 2025Updated last year
- B-Sides CBR 2018 talk about group policy and Grouper☆38May 3, 2019Updated 6 years ago
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Speeding up identifying which binaries with a SUID flag may lead to root access☆15Aug 26, 2024Updated last year
- Network summary, design, and connectivity information.☆20Dec 14, 2024Updated last year
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- WPA/WPA2 SECURITY HACK WITHOUT BRUTE FORCE☆16Mar 7, 2017Updated 9 years ago
- zsh plugin for metasploit framework☆14Nov 1, 2017Updated 8 years ago
- Wi-Fi Hacking Workshop☆14Dec 27, 2020Updated 5 years ago
- r0ak ("roak") is the Ring 0 Army Knife -- A Command Line Utility To Read/Write/Execute Ring Zero on for Windows 10 Systems☆28Jul 27, 2018Updated 7 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- Post Exploitation Linux Toolkit☆20Dec 31, 2014Updated 11 years ago
- ☆13Apr 16, 2016Updated 9 years ago
- Shellcode injection using debugging APIs☆19Jan 13, 2014Updated 12 years ago
- robertfoster's PKGBUILD☆11Mar 24, 2026Updated last week
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Mobirise plugin using Google Firebase☆10Oct 6, 2017Updated 8 years ago
- Supercharged USB bootloader for various PIC24/dsPIC33 MCUs.☆12Jul 8, 2021Updated 4 years ago
- ☆10Jun 24, 2020Updated 5 years ago
- C++ POC code for the wlbsctrl.dll hijack on IKEEXT☆55Apr 18, 2019Updated 6 years ago
- Helper script for mangling CS payloads☆51May 5, 2019Updated 6 years ago
- Class☆10Nov 10, 2020Updated 5 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Instrument definitions for the Sequentix Cirklon☆10May 22, 2017Updated 8 years ago
- Filet-O-Firewall Vulnerability PoC☆61Sep 4, 2015Updated 10 years ago
- A simple framework for determining network trust with NetworkManager☆18Feb 4, 2024Updated 2 years ago
- Reversing library based off sleigh from the Ghidra project. Pcode IR access, disassembly, C++17☆13Nov 12, 2021Updated 4 years ago
- Code that can be used to create/steal/manipulate token contexts in a program. Can be implemented into other C# projects.☆12Jan 3, 2019Updated 7 years ago
- Extract registry and NTDS secrets from local or remote disk images☆45Mar 15, 2025Updated last year
- Sparse Matrix Factorization (SMF) is a key component in many machine learning problems and there exist a verity a applications in real-w…☆11Jan 25, 2016Updated 10 years ago