Repository with some necessary information for you to create your PenTest consultancy
☆102Jan 12, 2025Updated last year
Alternatives and similar repositories for PenTest-Consulting-Creator
Users that are interested in PenTest-Consulting-Creator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆212Mar 4, 2022Updated 4 years ago
- ☆896Mar 17, 2026Updated 2 weeks ago
- DursVuln - Nmap Scripting Engine (NSE)☆22Jul 16, 2025Updated 8 months ago
- Creating them Golden Tickets☆14Aug 16, 2025Updated 7 months ago
- ☆24Oct 12, 2021Updated 4 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Offensive Security OSWE Prep 2022☆76Sep 10, 2022Updated 3 years ago
- Azure and AWS Attacks☆1,114Nov 25, 2022Updated 3 years ago
- Amsi Bypass payload that works on Windwos 11☆379Jul 30, 2023Updated 2 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Spring4Shell reproduce☆11Apr 1, 2022Updated 4 years ago
- ☆20May 18, 2022Updated 3 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆757Aug 26, 2022Updated 3 years ago
- OSWE, OSEP, OSED, OSEE☆3,794Jan 2, 2026Updated 3 months ago
- ☆11May 30, 2021Updated 4 years ago
- ☆31May 31, 2022Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Feb 12, 2022Updated 4 years ago
- Cybersecurity Notes☆169Apr 11, 2024Updated last year
- ☆33Aug 25, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆1,996May 20, 2025Updated 10 months ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Blazing fast CTF platform from the future. This is a GitHub mirror of the GitLab repository (https://gitlab.com/Milkdrop/ctfx)☆16Oct 27, 2023Updated 2 years ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- ☆484Aug 12, 2022Updated 3 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 9 months ago
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Aug 16, 2022Updated 3 years ago
- ☆22Jul 13, 2022Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 3 years ago