A collection of awesome penetration testing resources, tools and other shiny things
☆33Oct 14, 2015Updated 10 years ago
Alternatives and similar repositories for awesome-pentest
Users that are interested in awesome-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A list of web application security☆26Oct 28, 2015Updated 10 years ago
- List of penetration testing tools.☆23Mar 25, 2020Updated 6 years ago
- A curated list of Chinese websites and personal blogs about ethical hacking and pentesting☆112Oct 8, 2020Updated 5 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Dec 4, 2015Updated 10 years ago
- Customizable lazy exploit pattern utility.☆13Oct 2, 2022Updated 3 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Username guessing tool for use against the default Solaris ftp service and GNU inetutils ftpd.☆20May 29, 2015Updated 10 years ago
- bSidesLisbon 2016 event contents☆10Dec 14, 2016Updated 9 years ago
- Dynamic binary instrumentation based crypto detection framework. Implementation of http://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumbe…☆18Feb 22, 2013Updated 13 years ago
- Exploit for Adobe Coldfusion BlazeDS Java Object Deserialization RCE☆11Feb 7, 2018Updated 8 years ago
- A collection of various deep learning architectures, models, and tips☆18Mar 4, 2020Updated 6 years ago
- ☆12Jan 7, 2020Updated 6 years ago
- Honeypot (Dionaea and kippo) setup script☆83Nov 9, 2016Updated 9 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A framework and build automation tool to process exploits/payloads to evade antivirus and endpoint detection response products using reus…☆11Jan 16, 2024Updated 2 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- I havent found a reasonable version of the BlackHole exploit kit without the ionCube annoyances; so here is a fix for that problem :) Pl…☆26Dec 14, 2016Updated 9 years ago
- giskismet – Wireless recon visualization tool☆55Aug 26, 2016Updated 9 years ago
- Managing items for mediafire-grab.☆11Jun 16, 2022Updated 3 years ago
- ident-user-enum is a simple PERL script to query the ident service (113/TCP) in order to determine the owner of the process listening on …☆37May 29, 2015Updated 10 years ago
- A curated list of overcoming imposter syndrome content (Articles, Books, Courses, Talks) that could help anyone find all the resources at…☆20May 23, 2020Updated 5 years ago
- https://www.amazon.com/Fine-Art-Small-Talk-Conversation/dp/1401302262☆13Jun 17, 2019Updated 6 years ago
- PRESTASHOP Modules Shell Exploit☆11Sep 9, 2017Updated 8 years ago
- Simple Tool for webhacking☆12Apr 4, 2023Updated 3 years ago
- Network sinkhole for isolated malware analysis☆40Mar 5, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Reinforcement Learning (RL) is believe to be a more general approach towards Artificial Intelligence (AI). RL is the foundation for many …☆13Dec 22, 2022Updated 3 years ago
- Evil mouse sideways 8 paper weight's☆10Jul 10, 2024Updated last year
- Inspire by Samy Kamkar's "DiffBits" software, except this is written in Python, not Perl.☆14Jul 28, 2021Updated 4 years ago
- My own custom payloads for any BAD USB. (These payloads work perfectly with Arduino, Pi Pico, & Rubber Ducky.☆13Jan 19, 2023Updated 3 years ago
- Some useful tools and scripts☆47Feb 11, 2023Updated 3 years ago
- Collections of tools, scripts, snippets and so on, used in Rev3rse Security Live☆24Dec 4, 2018Updated 7 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Some papers and exploit writeups about WebKit.☆21Feb 18, 2024Updated 2 years ago
- Hide the TCP Connection☆22Mar 24, 2023Updated 3 years ago
- My curated list of best Stackoverflow questions that I have come across. Contributions are welcome!!☆13Jan 24, 2021Updated 5 years ago
- Code related with system programming (os, admin, etc.)☆13Jul 11, 2020Updated 5 years ago
- A curated list of delightful productivity resources.☆12Feb 12, 2025Updated last year
- API Tracker by Cysinfo Team☆22Oct 12, 2016Updated 9 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago