BishopFox / public-pentesting-reports
Curated list of public penetration test reports released by several consulting firms and academic security groups
☆18Updated 4 years ago
Alternatives and similar repositories for public-pentesting-reports:
Users that are interested in public-pentesting-reports are comparing it to the libraries listed below
- Automatically run and save ffuf scans for multiple IPs☆77Updated last year
- This script is a multi-threaded Okta password sprayer.☆70Updated last year
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆30Updated last year
- Merge multiple nMap xml files into one☆50Updated 5 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 2 years ago
- ☆34Updated 2 years ago
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Import Nmap scans to Cherrytree☆36Updated 2 years ago
- recon-ng modules for Censys☆37Updated last year
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Lookup for interesting stuff in SMB shares☆149Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Fly into Gophish with One Click (Infra Automation)☆47Updated last year
- A list of "secrets" from JWT sample code and readme files.☆54Updated 4 years ago
- ☆51Updated 6 years ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- A simple script that generates an Excel friendly CSV file from an Amass JSON file.☆13Updated 2 years ago
- Enumerate AWS permissions and resources.☆68Updated 2 years ago
- Find the remote website version based on a git repository☆125Updated 3 years ago
- ☆150Updated last year
- autocrack adds queue support for hashcat cracking.☆41Updated 2 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆73Updated 4 months ago
- Automate the build of a vulnerable AD environment.☆36Updated 2 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆43Updated last year
- ☆77Updated 5 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆61Updated 3 years ago