A small program that installs tools that you might need for pentesting
☆31Oct 30, 2021Updated 4 years ago
Alternatives and similar repositories for Pentest-tools
Users that are interested in Pentest-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆25Mar 21, 2020Updated 6 years ago
- A simple, lightweight Remote Access Tool written in Python☆16Apr 11, 2019Updated 6 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Mar 10, 2026Updated 2 weeks ago
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., re…☆18Jun 30, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 6 years ago
- PAKURI has been merged with Python and launched as a new project, PAKURI-THON.☆142Jan 25, 2022Updated 4 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration t…☆26May 8, 2020Updated 5 years ago
- Mixeway Scanner is Spring Boot application which aggregate integration with number of OpenSource Vulnerability scanners - both SAST and D…☆24Oct 7, 2021Updated 4 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- Web Recon & Exploitation Tool.☆55Mar 8, 2020Updated 6 years ago
- Yet another OSINT automator.☆18Nov 15, 2020Updated 5 years ago
- phishfactory offers a variety of email templates for spear-phishing attacks. [more templates to still be added]☆19Jan 4, 2021Updated 5 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- Golang Implant & Post-Exploitation Framework☆60Jun 30, 2023Updated 2 years ago
- Custom security distro for remote penetration testing☆56Mar 26, 2021Updated 5 years ago
- About All in one tool for Information Gathering, Vulnerability Scanning and Crawling. A must have tool for all penetration testers☆67Nov 22, 2020Updated 5 years ago
- wifi attacks suite☆59Sep 24, 2020Updated 5 years ago
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- Wi-Fi Exploit Tool☆50May 23, 2020Updated 5 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- A tool written in python for scraping firebase data☆43Apr 5, 2020Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Oct 9, 2020Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Sep 18, 2020Updated 5 years ago
- Web application pentesting recon☆23Jul 25, 2020Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suite☆73Jun 19, 2023Updated 2 years ago
- Offensive penetration testing. Perform multiple attack types against web applications, vulnerable programs and OSes in predefined and saf…☆26Aug 14, 2020Updated 5 years ago
- ☆11Jul 5, 2016Updated 9 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- ☆12Jul 15, 2018Updated 7 years ago
- ☆12Sep 23, 2023Updated 2 years ago
- ☆16Feb 11, 2019Updated 7 years ago
- A Burp Suite extension to parse Content-Transfer-Encoding: quoted-printable emails received in Burpcollaborator's SMTP☆30Aug 8, 2020Updated 5 years ago
- NSA tool hacking☆15May 20, 2018Updated 7 years ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- Simple RAT in C#☆27Apr 11, 2020Updated 5 years ago