A personal collection of scripts for decrypting various things.
☆20Feb 20, 2023Updated 3 years ago
Alternatives and similar repositories for decryptocollection
Users that are interested in decryptocollection are comparing it to the libraries listed below
Sorting:
- Simple way to disable/rename buttons from a task manager☆30Feb 17, 2020Updated 6 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Mar 27, 2024Updated last year
- ☆15Sep 4, 2024Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Live-Armor: Building Custom Linux Live Images for Security Sandboxing☆11Mar 25, 2015Updated 10 years ago
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆112Dec 11, 2023Updated 2 years ago
- Shell intended for forwarding-only ssh connection via jumphost☆11Jun 27, 2018Updated 7 years ago
- BurpSuite dockerized☆11Mar 2, 2018Updated 8 years ago
- Making me more antisocial and weird.☆10Oct 6, 2020Updated 5 years ago
- Our interviewing prep resources.☆10Jan 12, 2016Updated 10 years ago
- Shellcode异或加密工具☆12Mar 23, 2017Updated 8 years ago
- Example of Kerberoasting Honeypot☆18Sep 11, 2025Updated 5 months ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- ☆11Aug 19, 2017Updated 8 years ago
- Returns a list of all Public IP addresses being used by your AWS account. You can configure which regions you want to query.☆14Jun 7, 2020Updated 5 years ago
- Script to setup a phishing server on the cloud☆13Apr 30, 2021Updated 4 years ago
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Interactive C Programming Self-Learning Course☆24Oct 6, 2025Updated 4 months ago
- SecrutiyTube Linux Assembly Exam☆11Dec 30, 2019Updated 6 years ago
- Socks5 proxy server by golang☆11Oct 10, 2019Updated 6 years ago
- Osquery Packs we use for customer security hardening☆12Jun 30, 2025Updated 8 months ago
- A Burp Suite extension that converts IP addresses to decimal notation, useful for SSRF bypass and WAF evasion testing. Created by Harshad…☆11Dec 9, 2024Updated last year
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- ☆12Jan 12, 2023Updated 3 years ago
- NTLMRelay for MS Exchange☆11Nov 13, 2018Updated 7 years ago
- Pastenum is a text dump enumeration tool.☆14Dec 9, 2013Updated 12 years ago
- ✨ Un code qui permet de Token Grab en Python par moi, et en français.☆11Jun 8, 2021Updated 4 years ago
- DCSync Attack from Outside using Impacket☆115May 2, 2022Updated 3 years ago
- nmap + masscan scan☆14Dec 15, 2022Updated 3 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- 实时监控news site☆12Jan 10, 2023Updated 3 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Project to practice the basic at exploit bufferoverflow bugs.☆11Jan 28, 2017Updated 9 years ago
- A curated list of interview questions on various domain☆10Feb 11, 2015Updated 11 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- IBM System i (formerly AS400, iSeries, i5, etc.)☆12Feb 10, 2013Updated 13 years ago