pen testing scripts
☆12Feb 7, 2021Updated 5 years ago
Alternatives and similar repositories for ToolBox
Users that are interested in ToolBox are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Handy script to automate the attack☆22Dec 19, 2019Updated 6 years ago
- pour plus de tutos veuillez visiter le site☆11Sep 21, 2020Updated 5 years ago
- Collection of nmap nse scripts☆23May 15, 2019Updated 6 years ago
- keylogger extension chrome, get cookie, redirection to fake web site or a nother website☆16Sep 21, 2020Updated 5 years ago
- first program python to steal password microsoft edge all version browser, send info to email☆13Feb 11, 2021Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- More simple and convenient C++ library to manipulate json and plist, maybe better than libplist.☆18Apr 14, 2026Updated 2 weeks ago
- steal password mozilla firefox ,windows,Linux☆10Oct 12, 2020Updated 5 years ago
- This is a simple python based CLI project that can map symptoms like Aarogya Setu app. it's also generate report using matplot library an…☆10Dec 28, 2020Updated 5 years ago
- ToyOS is a simple x86 OS that only accepts numeric values into the input stream and returns them to a standard out console.☆12Nov 27, 2025Updated 5 months ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆16Jan 8, 2019Updated 7 years ago
- [BASH] Password generator through a wordlist☆12Mar 15, 2013Updated 13 years ago
- A shell script that translates strings of characters and sends them to a VirtualBox guest☆19Nov 8, 2018Updated 7 years ago
- NOGO is a packaging script that creates fully undetectable payloads specializing in disabling anti-virus. Created for pentesting (crippli…☆11Apr 23, 2019Updated 7 years ago
- Get/dump chrome and firefox saved passwords.☆20Sep 13, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Automated DevOps is a repo that integrates Red Hat Linux 8, CentOS Stream and Oracle Linux 8 Packer templates for a vSphere & ESXi enterp…☆17Nov 26, 2025Updated 5 months ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- A ton of helpful tools☆15Jul 31, 2016Updated 9 years ago
- Powerful WiFi Hacking penetration testing tools for Linux, designed for ethical hacking, security testing, and network auditing.☆18Nov 18, 2025Updated 5 months ago
- Nmap NSE scripts☆28Feb 1, 2022Updated 4 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- A library to handle Apple Property List format in binary or XML☆18Feb 11, 2012Updated 14 years ago
- ☆11May 30, 2021Updated 4 years ago
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- NSE-script for brute force open ports☆27Jun 14, 2015Updated 10 years ago
- How to Hack an Android Phone using an Malicious Android Application - Part-2 (More Sophisticated Way)☆11Oct 26, 2021Updated 4 years ago
- A python application to steal chrome data and push it back to you.☆19May 10, 2020Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Detect whether an IP address belongs to a Tor exit node.☆22Jan 6, 2023Updated 3 years ago
- A series of small ARM 64 bite-size articles to help one better reverse AArch64 ARM 64 Linux binaries.☆21Nov 27, 2025Updated 5 months ago
- keylogger + cryptojacking extension chrome and mozilla ,basic malware browser Keylogger capture credentials,IP ,and send inormations to a…☆33Sep 21, 2020Updated 5 years ago
- iDevice Bootloader Recovery Shell☆23Jan 17, 2013Updated 13 years ago
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A Proof-Of-Concept for the recently found CVE-2021-44228 vulnerability.☆11Nov 26, 2022Updated 3 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆10Oct 12, 2019Updated 6 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- ☆36Dec 3, 2024Updated last year
- Restores firmware and filesystem to iPhone/iPod Touch☆12Jun 7, 2010Updated 15 years ago
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- A library to handle Apple Property List format whereas it's binary or XML☆53Aug 23, 2010Updated 15 years ago