A CLI tool for managing DigitalOcean droplets with automated setup, SSH configuration, and lifecycle management.
☆67Updated this week
Alternatives and similar repositories for dropkit
Users that are interested in dropkit are comparing it to the libraries listed below
Sorting:
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆12Mar 14, 2018Updated 7 years ago
- Just another AD training, but free.☆15Aug 9, 2025Updated 6 months ago
- Effectively search the Exploit-DB☆15Apr 16, 2020Updated 5 years ago
- A framework and taxonomy for identifying, classifying, and reasoning about detection logic bugs in SIEM, EDR, and XDR rules, with concret…☆40Updated this week
- Custom scripts released for BSidesDC 2016☆14Oct 19, 2016Updated 9 years ago
- This tool provides an interactive TUI for reviewing Nessus finding exports, running security tools (nmap, netexec, metasploit), and track…☆63Feb 5, 2026Updated 3 weeks ago
- Performing secure code review with LLMs (and vibe coding IDEs)☆36Aug 5, 2025Updated 6 months ago
- A Dockerized build pipeline for custom Windows x64 shellcode☆54Dec 12, 2025Updated 2 months ago
- TLS ClientHello/QUIC Initial Packet reflection service☆25Jun 6, 2024Updated last year
- Caterpillar is a security scanning library for AI agent skill files (e.g., Claude Code skills) for dangerous or malicious behavior☆32Feb 16, 2026Updated last week
- Proof of concept communications from C# via a web browser process☆21Feb 15, 2019Updated 7 years ago
- AI-powered Windows Event Log analyzer that learns from your feedback. Uses Claude AI with RAG to detect suspicious activity, improve ac…☆36Dec 18, 2025Updated 2 months ago
- A collection of one off hacks and simple scripts☆26Mar 21, 2023Updated 2 years ago
- Security gateway for AI agents - credential-isolated API proxying and policy-gated remote execution (conclaves). Reduce the blast radius!☆77Feb 20, 2026Updated last week
- ☆43Aug 27, 2025Updated 6 months ago
- ADscan is a pentesting tool focused on automating collection, enumeration and common attack paths in Active Directory. It provides an int…☆54Feb 10, 2026Updated 2 weeks ago
- My Quick Note of BlackHat 2015 Arsenal☆26Aug 13, 2015Updated 10 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Scripts from Ghidra Golf competitions☆34Jan 24, 2023Updated 3 years ago
- MSIX Building Made Easy for Defenders☆59Aug 25, 2025Updated 6 months ago
- Lightweight macOS detection agent built on Santa’s Endpoint Security telemetry.☆105Dec 3, 2025Updated 2 months ago
- HashiCorp-relevant rules for the Semgrep code analysis tool☆41Oct 3, 2023Updated 2 years ago
- ☆34Apr 29, 2021Updated 4 years ago
- Simple LLM service identification - translate IP:Port to Ollama, vLLM, LiteLLM, or 30+ other AI services in seconds☆16Feb 16, 2026Updated last week
- A malicious OAuth application that can be leveraged for both internal and external phishing attacks targeting Microsoft Azure and Office3…☆167Jul 31, 2025Updated 6 months ago
- A security assessment tool for Hitachi Vantara's Pentaho Business Analytics platform.☆13Oct 31, 2021Updated 4 years ago
- Code Repository for Linux Troubleshooting Course with Real Life Examples, published by Packt☆12Jul 8, 2025Updated 7 months ago
- This JavaScript CLI "undeletes' packages that have been removed from the NPM registry☆29Dec 18, 2025Updated 2 months ago
- This is a PoC using native windows API directx, to hide and decrypt shellcode via compute shader☆10May 3, 2025Updated 9 months ago
- Metasploit_postgresql_database_connection_fix☆12Jan 30, 2019Updated 7 years ago
- Small Node CLI tool to extract active contributors on repos and orgs☆10Dec 6, 2022Updated 3 years ago
- Community Eventing and Scripting examples☆18Aug 11, 2025Updated 6 months ago
- Python client for McAfee ePolicy Orchestrator☆15Mar 12, 2021Updated 4 years ago
- ☆10Oct 22, 2017Updated 8 years ago
- Simple Command Line Tool to Enumerate Slack Workspace Names from Slack Webhook URLs.☆41Dec 12, 2023Updated 2 years ago
- prel(iminary) is an application that temporarily assigns Google Cloud IAM Roles and includes an approval process.☆46Updated this week
- A Docker lab integrating Splunk SIEM with Ollama LLM via Model Context Protocol for AI-powered security operations. Features Promptfoo e…☆18Aug 17, 2025Updated 6 months ago
- ☆20Jan 12, 2022Updated 4 years ago
- Track previous changes on specific AD accounts (users, computers) and Groups (online DC), even if event logs were wiped/not collected (e.…☆16Feb 25, 2025Updated last year