A collection of awesome penetration testing resources, tools and other shiny things
☆33Oct 14, 2015Updated 10 years ago
Alternatives and similar repositories for awesome-pentest
Users that are interested in awesome-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of web application security☆26Oct 28, 2015Updated 10 years ago
- A curated list of Chinese websites and personal blogs about ethical hacking and pentesting☆112Oct 8, 2020Updated 5 years ago
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆2,109May 27, 2022Updated 3 years ago
- Using a Google a Programmable Search Engine to make custom Digital Business Card Search Engine☆10Oct 4, 2022Updated 3 years ago
- Lab set-up for learning SQL Injection Techniques☆101Dec 6, 2020Updated 5 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- Labs from our workshop "Demystifying the server-side".☆17May 30, 2022Updated 3 years ago
- experiment☆11Jan 29, 2021Updated 5 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- A collection of various deep learning architectures, models, and tips☆18Mar 4, 2020Updated 6 years ago
- Malware visualization on earth map☆41Jan 26, 2015Updated 11 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆23Jan 22, 2017Updated 9 years ago
- Honeypot (Dionaea and kippo) setup script☆83Nov 9, 2016Updated 9 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Networking and attacking scripts.☆10Apr 20, 2017Updated 9 years ago
- Shell Utils is an educational framework designed to make shell programming accessible and powerful. It is the result of extensive work ov…☆13Updated this week
- ☆14Sep 6, 2019Updated 6 years ago
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆25Dec 14, 2016Updated 9 years ago
- giskismet – Wireless recon visualization tool☆56Aug 26, 2016Updated 9 years ago
- Python package to encode THREE QR codes into ONE.☆11Jun 14, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Unix/Linux System Programming☆17Jan 1, 2015Updated 11 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- Go library to follow a file for changes; e.g. "tail -F".☆20Feb 17, 2026Updated 2 months ago
- Burp-Addons : Some of Burp Addons I use ( Mindak ak fahem )☆11Sep 1, 2022Updated 3 years ago
- A passive scanning tool for finding expired domain vulnerabilities while you browse.☆43Feb 6, 2019Updated 7 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- ATM Configurator aka Tyupkin trojan☆11Mar 23, 2015Updated 11 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Official repository for ASAP: High System-code Security at Low Overhead☆27Dec 3, 2015Updated 10 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- A windows kernel-mode rootkit with remote control☆11Sep 17, 2022Updated 3 years ago
- Collect and filter location information from social network services.☆11Jun 14, 2020Updated 5 years ago
- Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live☆24Dec 4, 2018Updated 7 years ago
- Creates fuzzing inputs for command line programs using help options and man pages.☆29Jun 17, 2015Updated 10 years ago
- Some papers and exploit writeups about WebKit.☆21Feb 18, 2024Updated 2 years ago