willasaywhat / vcm
A small script to automate project folder management and basic tool output
☆35Updated 5 years ago
Alternatives and similar repositories for vcm
Users that are interested in vcm are comparing it to the libraries listed below
Sorting:
- A bunch of scripts I use to work with urlscan.io☆34Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- Container and files for a beginners workshop on writing Linux x86_64☆25Updated 4 years ago
- Scoring Engine for CTF competitions☆47Updated 2 years ago
- ANWI - All New Wireless IDS☆27Updated 6 years ago
- Creates dictionaries based on Wikipedia titles☆61Updated 5 years ago
- Cowrie Honeypot Obscurer☆17Updated 4 years ago
- first commit☆20Updated last year
- Red Team Resources☆60Updated 6 years ago
- Code/videos/supporting files for the demos of my Defcon24 talk, "Let's Get Physical: Network Attacks Against Physical Security Systems"☆42Updated 8 years ago
- Password Guessing for different Web Portals☆29Updated 6 years ago
- Enterprise WPA Wireless Tool Suite☆84Updated 2 years ago
- ☆8Updated 7 years ago
- I'll post my custom shellcode I make here!☆22Updated 5 years ago
- Finds sensitive stuff in your git repository by specifying terms to look for☆31Updated 7 years ago
- Automated enumeration☆30Updated 4 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- List of Red Team Repositories☆17Updated 6 years ago
- ☆13Updated 7 years ago
- Password policies. Yuck. Luckily they make for predictable passwords.☆8Updated 7 years ago
- ☆57Updated 4 years ago
- ☆14Updated 7 years ago
- Here's a Perl script that can either be used as a protocol fuzzer, or a DoS tool☆24Updated 7 years ago
- This PowerShell script will determine if your connection to external servers over HTTPS is being decrypted by an intercepting proxy such …☆67Updated 7 years ago
- KillerZee: Tools for Attacking and Evaluating Z-Wave Networks☆54Updated 6 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Six Degrees of Domain Admin☆15Updated 7 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆28Updated last year
- Because I can't find scripts to do this anywhere else...☆25Updated 8 years ago