BastienFaure / jarvisLinks
The pentest companion
☆15Updated 4 years ago
Alternatives and similar repositories for jarvis
Users that are interested in jarvis are comparing it to the libraries listed below
Sorting:
- Ansible scripts to build an attack box☆24Updated 7 years ago
- another nmap summarising script☆26Updated 5 years ago
- Faraday's Command Line Interface☆51Updated 4 months ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆51Updated 5 years ago
- A static website template for security pages.☆53Updated 5 months ago
- A dockerized, improved version of the Impacket smbserver.py☆39Updated 6 years ago
- The SSH Multiplex Backdoor Tool☆65Updated 6 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Python script for privilege escalation for Python☆11Updated 5 years ago
- A tool for enumerating and retrieving exposed git repositories to recover source trees from external environments. Can utilise File Inclu…☆23Updated 5 years ago
- Directory/file & DNS busting tool written in Go☆14Updated 6 years ago
- Useful commands for infosec☆28Updated 2 years ago
- Simple S3 Bucket Testing Software☆31Updated 4 years ago
- Hayat is a script for report and analyze Google Cloud Platform resources.☆81Updated 6 years ago
- Various XSL templates to manipulate data from NMap XML reports☆27Updated 7 years ago
- A repo containing some stagers and setup scripts for configuring Salt Stack to be a "bad"-ass C2☆18Updated 6 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Updated 6 years ago
- WStalker: an easy proxy☆25Updated 5 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Standardizing Security Titles☆13Updated last week
- Shell utility to list colorfully show what processes are listening on what ports.☆19Updated 6 years ago
- List (or plunder) private repos/gists to which a token has access, including those of other users☆10Updated 3 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- Simple reverse shell over Slack☆57Updated 4 years ago
- 🏰 A Python script for AWS S3 bucket enumeration.☆54Updated 5 years ago
- Reverse or bind shell catcher which uprgrades the caught shell to be more like a regular shell☆27Updated 6 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- interact with HackTheBox from your terminal☆24Updated 6 years ago
- A CLI tool for querying passive DNS services☆42Updated 2 years ago
- Setup Kali XFCE version with some hi-dpi friendly style☆32Updated 6 years ago