AlessandroZ / pentest-tools
Custom pentesting tools
☆13Updated 5 years ago
Alternatives and similar repositories for pentest-tools:
Users that are interested in pentest-tools are comparing it to the libraries listed below
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- A default credential scanner.☆9Updated 6 years ago
- Network Infrastructure Penetration Testing Tool☆15Updated 7 years ago
- Just a quick'n'dirty tool to parse leaked databases (csv-like or sql format)☆24Updated 6 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- Password Recovery Toolkit For Windows Written in Python 3☆26Updated last year
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆12Updated 4 years ago
- Metasploit Framework☆10Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Updated 6 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Updated 5 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Updated 6 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆29Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆27Updated 5 years ago
- Windows Keylogger in C++☆17Updated 2 years ago
- WebHook for Red Team☆24Updated 3 years ago
- MSFVenom Powershell Stager Encoder & Generator☆15Updated 3 years ago
- Captive Portal. A Hotspot or Evil twin which redirects the clients to login page to enter credentials. Simple and easy to use with less b…☆23Updated 6 years ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆32Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆12Updated 5 years ago
- Threat hunting tool for scraping latest scrapes from Pastebin☆32Updated 3 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 4 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 4 years ago