AlessandroZ / pentest-tools
Custom pentesting tools
☆13Updated 5 years ago
Alternatives and similar repositories for pentest-tools:
Users that are interested in pentest-tools are comparing it to the libraries listed below
- A default credential scanner.☆9Updated 6 years ago
- A collection of hacks and one-off scripts☆10Updated 4 years ago
- A collection of awesome penetration testing resources, tools and other shiny things☆12Updated 5 years ago
- Empire is a PowerShell and Python 3.x post-exploitation framework.☆17Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 8 years ago
- WebHook for Red Team☆24Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆13Updated 4 years ago
- Gain A Meterpreter Shell With A BadUSB Attack In Less Than 5 Seconds.☆16Updated 3 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Updated 6 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- Network Infrastructure Penetration Testing Tool☆15Updated 7 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆29Updated 2 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆36Updated 2 years ago
- Network Scanner with Backdoor Detection, other Nmap resources and syn-protection detection☆32Updated last year
- SSH Honeypot that gathers creds and attempted commands☆19Updated 3 years ago
- Automated Penetration Testing☆14Updated 4 years ago
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)☆16Updated 7 months ago
- Automated encryption utilities and installation☆12Updated 4 years ago
- pen testing scripts☆11Updated 4 years ago
- Silent Screenshot Capture | Post Exploitation Payload | VB.NET☆20Updated 4 years ago
- Python RAT with reverse connection and asymmetric encrypted communications☆15Updated 4 years ago
- Script to utilize the v2 pwndb onion site to find leaked passwords.☆19Updated 2 years ago
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆12Updated 4 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Updated 5 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆30Updated 4 years ago
- A Simple C&C Server Written In Python☆34Updated 6 years ago
- BruteProxy.py framework for brute-forcing via HTTP/HTTPS requests with looping proxies.☆12Updated 8 months ago