Scripts and things.
☆13Jan 23, 2026Updated last month
Alternatives and similar repositories for runZero-scripts
Users that are interested in runZero-scripts are comparing it to the libraries listed below
Sorting:
- ☆15Dec 22, 2021Updated 4 years ago
- ☆13Nov 29, 2021Updated 4 years ago
- ☆39Sep 25, 2023Updated 2 years ago
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- ☆11Oct 21, 2024Updated last year
- A list of all known CoDeSys PLCs, along with notes regarding what version, what protocols and ports are used on each.☆14May 5, 2023Updated 2 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- OpenHashAPI provides a secure method of communicating hashes and enables lightweight workflows for security practitioners and enthusiasts…☆13Oct 27, 2024Updated last year
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- Domain, IPv4 & v6 address & network information gathering, web server analysis, DNS- & BGP- related information☆12Nov 29, 2023Updated 2 years ago
- Offensive Windows security tooling that allows for persistance to the operating system.☆10Apr 28, 2021Updated 4 years ago
- ☆11Nov 8, 2022Updated 3 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Python application to scan user's installed browsers for secrets such as stored passwords and cookies.☆14Jun 16, 2021Updated 4 years ago
- ☆13Mar 12, 2022Updated 3 years ago
- ☆13Jan 4, 2023Updated 3 years ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- Improves vulnerability prioritization by enhancing CVSS scores with exploit intelligence. Combines data from CISA KEV, EPSS, Metasploit, …☆14Updated this week
- Specific guidance and configuration scripts based on Microsoft-recommended security configuration baselines for Windows.☆14Aug 22, 2020Updated 5 years ago
- Write Singer data to JSONL files☆15Sep 1, 2023Updated 2 years ago
- A/D CTF services developed for ECSC 2022☆12Nov 11, 2022Updated 3 years ago
- A repository of Sysmon For Linux configuration modules☆16Oct 14, 2021Updated 4 years ago
- Web scraping | Website cloner | Path Traversal Scanner☆16Sep 27, 2025Updated 5 months ago
- Generate Markdown tables from CSV data online.☆17Dec 8, 2022Updated 3 years ago
- Data for CyberSOCEval, an LLM benchmark by Meta & CrowdStrike☆20Sep 22, 2025Updated 5 months ago
- Rolling Timeline for Incident Recorder.☆14Dec 4, 2023Updated 2 years ago
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- ☆13Dec 29, 2020Updated 5 years ago
- Proof of Concept for CVE-2021-1585: Cisco ASA Device Manager RCE☆13Aug 15, 2022Updated 3 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- System Call Integrity Layer - experimental security research☆25Jan 31, 2026Updated last month
- Indicators of Normality☆11Jul 22, 2022Updated 3 years ago
- Monorepo for challenges, infra, and theming for UIUCTF 2024 (https://2024.uiuc.tf/)☆17Jul 14, 2024Updated last year
- ☆19Jan 31, 2025Updated last year
- Collection of scripts / samples / snippits around the community service at www.filescan.io☆15Nov 6, 2025Updated 3 months ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 7 months ago