ChrisTruncer / PenTestScripts
Scripts that are useful for me on pen tests
☆524Updated 2 years ago
Alternatives and similar repositories for PenTestScripts:
Users that are interested in PenTestScripts are comparing it to the libraries listed below
- A ton of helpful tools☆334Updated 3 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆323Updated 6 years ago
- Network reconnaissance and vulnerability assessment tools.☆399Updated 3 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Collection of social engineering payloads☆295Updated 7 years ago
- Pentest Lab on OpenStack with Heat, Chef provisioning and Docker☆379Updated 7 years ago
- locate and attack Lync/Skype for Business☆335Updated 5 months ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Red Team Tips as posted by @vysecurity on Twitter☆1,050Updated 4 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆467Updated 5 years ago
- ☆603Updated 4 months ago
- Search for categorized domain☆443Updated 6 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆526Updated 4 years ago
- ☆512Updated last year
- ☆280Updated 4 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆275Updated 9 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Updated 4 years ago
- PwnWiki - The notes section of the pentesters mind.☆560Updated 6 years ago
- Network Pivoting Toolkit☆441Updated last year
- Remote Recon and Collection☆448Updated 7 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆282Updated 3 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆365Updated 7 months ago
- Issues to consider when planning a red team exercise.☆614Updated 7 years ago