100 projects for "security script" with 1 filter applied:

  • Premier Construction Software Icon
    Premier Construction Software

    Premier is a global leader in financial construction ERP software.

    Rated #1 Construction Accounting Software by Forbes Advisor in 2022 & 2023. Our modern SAAS solution is designed to meet the needs of General Contractors, Developers/Owners, Homebuilders & Specialty Contractors.
    Learn More
  • Loan management software that makes it easy. Icon
    Loan management software that makes it easy.

    Ideal for lending professionals who are looking for a feature rich loan management system

    Bryt Software is ideal for lending professionals who are looking for a feature rich loan management system that is intuitive and easy to use. We are 100% cloud-based, software as a service. We believe in providing our customers with fair and honest pricing. Our monthly fees are based on your number of users and we have a minimal implementation charge.
    Learn More
  • 1
    pwd.sh

    pwd.sh

    GnuPG symmetric secrets manager using Bash

    pwd.sh is a lightweight command-line utility designed to generate strong, secure passwords using simple and reproducible methods directly from the terminal. The tool focuses on usability and security by leveraging deterministic techniques that allow users to generate complex passwords without needing to store them. It is particularly useful for users who want to avoid password reuse while maintaining memorability or reproducibility. The script is designed to be minimal and portable, making it easy to integrate into shell environments and workflows. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    Prodigy Hack

    Prodigy Hack

    One of the best Prodigy hacks

    ...The tool is often used for experimentation, reverse engineering, or demonstrating vulnerabilities in browser-based applications. It also reflects broader concepts in web security, particularly the importance of server-side validation and secure state management.
    Downloads: 226 This Week
    Last Update:
    See Project
  • 3
    Flan Scan

    Flan Scan

    A pretty sweet vulnerability scanner

    ...Users provide target IPs or CIDR ranges, and the tool orchestrates Nmap scans with version detection and the “vulners” NSE script, collects results, and outputs aggregated reports in formats like LaTeX, markdown, or JSON.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    subfinder

    subfinder

    Fast passive subdomain enumeration tool

    Subfinder is a high-performance passive subdomain discovery tool built for fast and reliable asset enumeration. It focuses exclusively on collecting valid subdomains from a wide range of passive online sources, prioritizing accuracy and speed over intrusive scanning techniques. The project is widely used in bug bounty hunting, penetration testing, and attack surface mapping because it minimizes noise while producing actionable results. Its modular architecture allows users to enable dozens...
    Downloads: 14 This Week
    Last Update:
    See Project
  • The full-stack observability platform that protects your dataLayer, tags and conversion data Icon
    The full-stack observability platform that protects your dataLayer, tags and conversion data

    Stop losing revenue to bad data today. and protect your marketing data with Code-Cube.io.

    Code-Cube.io detects issues instantly, alerts you in real time and helps you resolve them fast. No manual QA. No unreliable data. Just data you can trust and act on.
    Learn More
  • 5
    x-ui-yg

    x-ui-yg

    The x-ui simplified and modified version of the script

    ...While it offers ease of use, it also highlights security considerations, encouraging the use of HTTPS and proper authentication for panel access. Overall, x-ui-yg is a lightweight yet powerful management solution for proxy infrastructure.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Pipeline Model Definition Plugin

    Pipeline Model Definition Plugin

    Dfine CI/CD workflows using Jenkinsfile

    The Pipeline Model Definition Plugin introduces Declarative Pipelines in Jenkins—offering a more structured, configuration-like syntax for defining CI/CD workflows using Jenkinsfile. It simplifies pipeline creation, gives clearer semantic error messages, supports post-build steps, and is fully extensible via APIs.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 7
    Dependabot

    Dependabot

    Dependabot's core logic for creating update PR's

    Dependabot-Core is the library at the heart of Dependabot security/version updates. Use it to generate automated pull requests updating dependencies for projects written in Ruby, JavaScript, Python, PHP, Dart, Elixir, Elm, Go, Rust, Java and .NET. It can also update git submodules, Docker files, and Terraform files. Check for the latest version of a dependency that's resolvable given a project's other dependencies. Generate updated manifest and lockfiles for a new dependency version....
    Downloads: 5 This Week
    Last Update:
    See Project
  • 8
    SkillForge

    SkillForge

    Ultimate meta-skill for generating best-in-class Claude Code skills

    SkillForge is a systematic methodology and tooling framework for creating high-quality AI “skills” specifically optimized for Claude Code integrations, treating skill creation as an engineering discipline rather than an ad-hoc art form. It introduces a multi-phase architecture where every input or request is triaged intelligently, analyzed deeply through structured lenses, specified formally, synthesized with automated generation, and finally subjected to multi-agent review before...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    free crypto exchange script

    free crypto exchange script

    download crypto exchange with source code free

    Best White Label Crypto Exchange Script | Launch Your Own Exchange Platform Start your own cryptocurrency exchange with our secure and scalable script. Download full crypto exchange source code and learn more about our solution. It is offered with full source code. Our centralized exchange solution enables trustful trading, liquidity pools, and seamless token listing. Built on blockchain, php, mysql, our script ensures high performance, scalability, and customization. Ideal for...
    Downloads: 6 This Week
    Last Update:
    See Project
  • Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight Icon
    Next-Gen Encryption for Post-Quantum Security | CLEAR by Quantum Knight

    Lock Down Any Resource, Anywhere, Anytime

    CLEAR by Quantum Knight is a FIPS-140-3 validated encryption SDK engineered for enterprises requiring top-tier security. Offering robust post-quantum cryptography, CLEAR secures files, streaming media, databases, and networks with ease across over 30 modern platforms. Its compact design, smaller than a single smartphone image, ensures maximum efficiency and low energy consumption.
    Learn More
  • 10

    YoungerSibling

    YoungerSibling: Cross-platform OSINT tool for quick data gathering.

    YoungerSibling is a Python-based terminal utility script designed for educational purposes. It provides a set of useful tools to perform tasks like searching the web, performing lookups (Google search, IP lookup, username lookup, etc.), and extracting metadata from images, directly from the terminal. This project aims to help students, developers, and hobbyists learn about web scraping, API usage, and terminal interaction with Python.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 11
    PeaZip

    PeaZip

    Free Zip software and Rar extractor

    PeaZip is a free archiver tool. The application provides an unified, natively portable, cross-platform file manager and archive manager GUI for many Open Source technologies like 7-Zip, FreeArc, PAQ, UPX. Create: 7Z, ARC, Brotl, BZip, GZip, PEA, TAR, WIM, XZ, ZPAQ, ZIP, Zstandard files and more Open and extract 200+ file types: ACE, CAB, DEB, ISO, RAR, ZIPX and more Features of PeaZip includes extract, create and convert multiple archives at once, create self-extracting archives...
    Leader badge
    Downloads: 1,637 This Week
    Last Update:
    See Project
  • 12
     Loi 25 Quebec Cookie Consent

    Loi 25 Quebec Cookie Consent

    Free WordPress plugin for Quebec's Law 25. Bilingual cookie banner

    The only FREE, open-source WordPress plugin fully compliant with Quebec’s Law 25 (Bill 64). Blocks tracking scripts (Google Analytics, Meta Pixel) until user consent. KEY FEATURES • Automatic Script Blocking: Paste scripts into the “Vault” — they run only after “Accept.” • Google Consent Mode v2: Supports ad_storage & analytics_storage. • Bilingual (FR/EN): Auto-detects WordPress language. • 3 Display Styles: Bar, Popup, or Corner Widget. • Lightweight: Vanilla JS (<10KB), no...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13
    ldap-searchEntries.pl is a small perl script that searches for entries based on a list provided by STDIN. The values given from STDIN are parsed into a filterstring containing placeholders. The found DNs are printed to STDOUT for each search. Parameters allow fine tuning of all features including attribute printing.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14

    Single Web Page to Edit any MySQL table

    Easily add a table editor for any table.

    ...Just put in the DB credentials, the file handles the rest. Optionally: * Put the credentials in a secure /etc/ folder to avoid accidents. * Also added a CSS page if you want it to look pretty. * Can also run a script on add/edit/delete. * Can also have a dropdown for ALL tables in a single DB instead of just a single table. Most importantly: You can allow a user to edit a single table with simple security and no access to anything else! Instantly. Add one web file, put in the credentials. It's "UP".
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    OnionSearch

    OnionSearch

    Search multiple Tor .onion engines at once and collect hidden links.

    OnionSearch is a Python-based command-line tool designed to collect and aggregate links from multiple search engines on the Tor network. The script works by scraping results from a variety of .onion search services, allowing users to perform a single query while gathering results from many sources at once. This approach helps researchers and investigators locate hidden services more efficiently without manually querying each individual search engine. It is primarily intended for educational...
    Downloads: 4 This Week
    Last Update:
    See Project
  • 16
    Open Crypto Tracker

    Open Crypto Tracker

    Bitcoin Alts portfolio tracker, email / text / alexa / telegram alerts

    100% FREE / open source / PRIVATE cryptocurrency portfolio tracker. Email / text / alexa / telegram price alerts, price charts, mining calcs, leverage / gain / loss / balance stats, news feeds +more. Privately track Bitcoin / Ethereum / unlimited cryptocurrencies. Customize as many assets / markets / alerts / charts as you want. Over 50 Exchanges / 40 Trading Pairs Supported (exchanges / pairings list at bottom of README.txt): https://tinyurl.com/ct-readme Nearly Unlimited Assets...
    Downloads: 2 This Week
    Last Update:
    See Project
  • 17
    CrossC2 framework

    CrossC2 framework

    generate CobaltStrike's cross-platform payload

    Support CobaltStrike's security assessment of other platforms (Linux/MacOS/...), and include the development support of Unix post-penetration module.
    Downloads: 4 This Week
    Last Update:
    See Project
  • 18
    linkedin2username

    linkedin2username

    Generate probable usernames from LinkedIn company employee lists

    ...Using these names, it automatically generates multiple possible username formats that organizations commonly use for accounts or email addresses. This process helps security researchers, penetration testers, and investigators perform reconnaissance by building potential username lists for further security testing or OSINT analysis. Unlike tools that rely on official APIs, linkedin2username operates as a pure web scraper and therefore does not require API keys. The script uses Selenium to automate browser interactions and perform searches within LinkedIn to gather employee data.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 19
    FilterBadRecruiters

    FilterBadRecruiters

    Google Apps Script to send third party recruiter email to spam

    FilterBadRecruiters is a Google Apps Script that processes new messages looking for unwanted email from known third party recruiters. When a match is found, a reply is sent informing the sender that the message is being reported as spam and will not be read. The script then logs matches to a spreadsheet and updates a pie chart displaying what percentage of these type of messages were sent from each domain.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20
    Alan Framework

    Alan Framework

    A C2 post-exploitation framework

    Alan Framework is a post-exploitation framework useful during red-team activities. You can run your preferred tool directly in-memory. JavaScript script execution (in-memory without third party dependency) Fully compliant SOCKS5 proxy. Supported agent types: Powershell (x86/x64), DLL (x86/x64), Executable (x86/x64), Shellcode (x86/x64). Server.exe can be executed in Linux (via dotnet core) The network communication is fully encrypted with a session key not recoverable from the agent binary...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 21
    yesitsme

    yesitsme

    Simple OSINT script to find Instagram profiles by name

    ...The tool requires an Instagram session cookie to operate and includes configurable timeout controls to help avoid detection or rate limiting during searches. Its minimal codebase and straightforward command-line interface make it accessible for researchers, security analysts, and digital investigators performing social media intelligence work.
    Downloads: 7 This Week
    Last Update:
    See Project
  • 22
    Big List of Naughty Strings

    Big List of Naughty Strings

    List of strings which have a high probability of causing issues

    The Big List of Naughty Strings is a community-maintained catalog of “gotcha” inputs that commonly break software, from unusual Unicode to SQL and script injection payloads. It exists so developers and QA engineers can easily test edge cases that normal test data would miss, such as zero-width characters, right-to-left marks, emojis, foreign alphabets, and long or malformed strings. By throwing these strings at forms, APIs, databases, and UIs, teams can discover encoding bugs, sanitizer gaps, rendering issues, and security oversights early. ...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    rust_cmd_lib

    rust_cmd_lib

    Common rust command-line macros and utilities

    ...It hides much of the boilerplate of std::process::Command when you're doing simple task automations, but still allows full flexibility when needed. Because it avoids launching a shell, it reduces some classes of security and quoting errors, while improving readability of scripting logic inside a Rust binary.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24

    RADPhE

    Rapid Application Development PHP Hosting Environment

    A Rapid PHP Application Development Environment designed for webmasters, developers, and hosts to enforce website uniformity, hardening, and light weight enough to function within shared hosting, in the presence of other scripts, and nested within itself.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    VENOM C2 shellcode

    VENOM C2 shellcode

    C2 shellcode generator/compiler/handler

    The script will use msfvenom (metasploit) to generate shellcode in different formats ( C# | python | ruby | dll | msi | hta-psh | doc | apk | macho | elf | deb | mp4 | etc ) injects the shellcode generated into one template (example: python) "the python function will execute the shellcode into ram" and uses compilers like gcc (gnu cross compiler) or mingw32 or pyinstaller to build the executable file. It also starts a handler to receive the remote connection (shell or meterpreter) venom...
    Downloads: 2 This Week
    Last Update:
    See Project
  • Previous
  • You're on page 1
  • 2
  • 3
  • 4
  • Next