☆26Apr 5, 2020Updated 5 years ago
Alternatives and similar repositories for PESTO
Users that are interested in PESTO are comparing it to the libraries listed below
Sorting:
- ☆21Jul 15, 2016Updated 9 years ago
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- ☆25May 9, 2021Updated 4 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 5 months ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- A tool to generate yara signatures from function blocks☆19Dec 8, 2014Updated 11 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- A collection of example apps for the Streamlabs OBS app platform.☆12Oct 26, 2023Updated 2 years ago
- ☆11Mar 9, 2018Updated 8 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- ☆94Aug 17, 2020Updated 5 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 7 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- ☆107May 28, 2021Updated 4 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- thethe☆115Oct 21, 2020Updated 5 years ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Jul 27, 2018Updated 7 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- ☆28Nov 20, 2025Updated 4 months ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago
- ☆42Dec 8, 2022Updated 3 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- Ip Vulnerability check to Eternal Blue , Romance , Synergy , Champion , Erraticgopher & Eagerlever☆124Nov 18, 2023Updated 2 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Jun 6, 2024Updated last year
- ☆35Aug 3, 2017Updated 8 years ago
- Neto | A tool to analyse browser extensions☆88Sep 20, 2020Updated 5 years ago