☆26Apr 5, 2020Updated 5 years ago
Alternatives and similar repositories for PESTO
Users that are interested in PESTO are comparing it to the libraries listed below
Sorting:
- Automate SSH communication with firewalls, switches, etc.☆27Mar 29, 2018Updated 7 years ago
- ☆25May 9, 2021Updated 4 years ago
- ☆21Jul 15, 2016Updated 9 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Password Lense: reveal character types in a password☆23Oct 18, 2025Updated 4 months ago
- A simple intrusion detection system that detects anomalous IP payloads, vertical and horizontal port scanning attacks in the selected net…☆10Apr 16, 2018Updated 7 years ago
- A simple tool to detect NBT-NS and LLMNR spoofing (and messing with them a bit)☆36Mar 21, 2019Updated 6 years ago
- Centralize Management of Intrusion Detection System like Suricata Bro Ossec ...☆71Apr 10, 2019Updated 6 years ago
- ☆11Mar 9, 2018Updated 7 years ago
- Check Domain Fronting (chkdfront) - It checks if your domain fronting is working☆44Jun 26, 2021Updated 4 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Randomly changes Win32/64 PE Files for 'safer' uploading to malware and sandbox sites.☆132Oct 30, 2013Updated 12 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- ☆28Apr 18, 2016Updated 9 years ago
- A Simple PE File Heuristics Scanners☆53Mar 8, 2019Updated 6 years ago
- DNCI - Dot Net Code Injector☆148Jan 11, 2021Updated 5 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- Repo containing docker-compose files and setup scripts without having to clone the individual reternal components☆112Mar 25, 2021Updated 4 years ago
- PostShell - Post Exploitation Bind/Backconnect Shell☆83Sep 9, 2019Updated 6 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Straight-forward HTTP client testing, assertions included!☆30Nov 20, 2025Updated 3 months ago
- Automated Application Generation for Stack Overflow Types on Wireless Routers☆54Jul 15, 2019Updated 6 years ago
- ☆14Aug 27, 2025Updated 6 months ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- ☆14Oct 3, 2018Updated 7 years ago
- ☆94Aug 17, 2020Updated 5 years ago
- ☆28Nov 20, 2025Updated 3 months ago
- GO sandbox to run untrusted code☆42Jan 17, 2020Updated 6 years ago
- Common password pattern generator using strings list☆131Nov 26, 2020Updated 5 years ago
- A simple python reverse shell written just for fun.☆62Feb 6, 2023Updated 3 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Rust implementation of the Process Herpaderping☆26Jul 6, 2023Updated 2 years ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- Linux Privilege Escalation Tool☆186Apr 12, 2019Updated 6 years ago
- A UNIX security auditing tool based on several security frameworks☆315Updated this week
- Learn basic crypto in 2 hours☆16Nov 25, 2021Updated 4 years ago
- Automated script for NMAP Scanner with some custom .nse scripts :) for lazy geeks :V☆17Nov 29, 2019Updated 6 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago