AlessandroZ / pentest-tools
Custom pentesting tools
☆13Updated 5 years ago
Alternatives and similar repositories for pentest-tools:
Users that are interested in pentest-tools are comparing it to the libraries listed below
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 4 years ago
- A default credential scanner.☆9Updated 6 years ago
- Captive Portal Attack Tool☆8Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Sponsored By Mr ROBOT☆14Updated 4 years ago
- ☆9Updated 10 months ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆21Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆12Updated 5 years ago
- An advance keylogger that works and also logs special keys.☆19Updated 2 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- KeplerPulse is a tool that generates a Powershell command that once executed on a Machine, Downloads and executes your desired Executable…☆10Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- Repository of tools used in my blog☆51Updated last year
- Keylogger for ethical hackers☆14Updated 3 years ago
- Github repository with Write Up, AutoPwn, Tools, Videos of CTF's from HackTheBox and TryHackMe☆16Updated 2 years ago
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Updated 4 years ago
- Virus Spreader, Hack windows (nc shell=default), Os_deletion☆9Updated 4 years ago
- ☆10Updated 4 years ago
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Inject Metasploit Shell Code in Legitimate Process☆11Updated 4 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Updated 6 years ago
- Leakix Searcher☆14Updated 3 years ago
- Network Infrastructure Penetration Testing Tool☆15Updated 7 years ago
- Disposable Mails From Command Line☆31Updated 5 years ago
- Exfiltrating "google account password" and "android cookies" made easy with evil browser. Checkout YouTube : https://youtu.be/pvuT0m4QUbU☆13Updated last year
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago