☆50Dec 11, 2025Updated 3 months ago
Alternatives and similar repositories for defensive-scripts
Users that are interested in defensive-scripts are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- RisingSun: Decoding SUNBURST C2 to identify infected hosts without network telemetry.☆10Jan 14, 2021Updated 5 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago
- WPUpdate is a simple Linux service that automatically checks for a new version of Wordpress each night at 2AM.☆36Feb 7, 2014Updated 12 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆50Apr 3, 2016Updated 10 years ago
- ☆16Jun 13, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ☆171Aug 22, 2023Updated 2 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- AV/EDR evasion via direct system calls.☆33Dec 7, 2020Updated 5 years ago
- Orchestrate gatherer, scanner, saver, and trustymail_reporter☆19Apr 2, 2026Updated last week
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Oct 15, 2022Updated 3 years ago
- ConQR is an open source ticketing system for conferences to issue QRCode's in a quick, efficient, and easy manner.☆79Sep 15, 2016Updated 9 years ago
- UNTESTED Reaver-WPS command-line for Android. Not proven to work with bcm4329 chipset based phones, but should probably do on bcm4330. RE…☆13May 17, 2014Updated 11 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆49Nov 11, 2015Updated 10 years ago
- Simple scripts used to invoke common functionality in Kali Linux and included tools☆11Mar 25, 2020Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- The TrustedSec Attack Platform is a reliable method for droppers on an infrastructure in order to ensure established connections to an or…☆502Nov 17, 2022Updated 3 years ago
- ☆81Nov 2, 2019Updated 6 years ago
- Random tips and tricks RE: ransomware☆14Aug 17, 2021Updated 4 years ago
- A tool for studying JavaScript malware.☆15Mar 31, 2026Updated last week
- The "DFUR" Splunk application and data that was presented at the 2020 SANS DFIR Summit.☆13Sep 9, 2020Updated 5 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆144Aug 9, 2015Updated 10 years ago
- ☆100Sep 15, 2025Updated 6 months ago
- Collection of PowerShell functinos and scripts a Blue Teamer might use☆88Oct 4, 2023Updated 2 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Exploits locked/password protected computers over USB, drops persistent WebSocket-based backdoor, exposes internal router, and siphons co…☆11Dec 28, 2016Updated 9 years ago
- A PowerShell incident response script for quick triage☆81Jul 18, 2022Updated 3 years ago
- Notes from my "Implementing a Kick-Butt Training Program: Blue Team GO!" talk☆14Mar 4, 2019Updated 7 years ago
- Useful Windows and AD tools☆15Feb 20, 2022Updated 4 years ago
- Simple PowerShell script to enable process scanning with Yara.☆99Oct 4, 2022Updated 3 years ago
- Various Topics☆18Apr 30, 2025Updated 11 months ago
- Recordization library☆11Apr 2, 2026Updated last week
- A collection of data exfiltration scripts for Red Team assessments.☆96Feb 21, 2020Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆81Mar 17, 2026Updated 3 weeks ago
- This project is aimed at freely providing technical guides on various hacking topics: Active Directory services, web services, servers, i…☆15Sep 18, 2020Updated 5 years ago
- ☆168Sep 22, 2023Updated 2 years ago
- Tool to rip system and user data from OSX and macOS☆16Dec 6, 2022Updated 3 years ago
- Responder is a LLMNR, NBT-NS and MDNS poisoner, with built-in HTTP/SMB/MSSQL/FTP/LDAP rogue authentication server supporting NTLMv1/NTLMv…☆35Nov 10, 2016Updated 9 years ago
- Microsoft Endpoint Manager Related☆17Updated this week
- ☆24Aug 30, 2019Updated 6 years ago