Repository with some necessary information for you to create your PenTest consultancy
☆102Jan 12, 2025Updated last year
Alternatives and similar repositories for PenTest-Consulting-Creator
Users that are interested in PenTest-Consulting-Creator are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆211Mar 4, 2022Updated 4 years ago
- ☆905Mar 17, 2026Updated last month
- Creating them Golden Tickets☆14Aug 16, 2025Updated 8 months ago
- ☆24Oct 12, 2021Updated 4 years ago
- Offensive Security OSWE Prep 2022☆79Sep 10, 2022Updated 3 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Azure and AWS Attacks☆1,119Nov 25, 2022Updated 3 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- Amsi Bypass payload that works on Windwos 11☆381Jul 30, 2023Updated 2 years ago
- A tool written in both bash and python to parse doc/ drive links and collect secrets in those :)☆18Jul 7, 2022Updated 3 years ago
- This Repository gives the best and possible strategies against hunting the ransomware☆26Aug 23, 2022Updated 3 years ago
- Spring4Shell reproduce☆11Apr 1, 2022Updated 4 years ago
- ☆20May 18, 2022Updated 3 years ago
- ☆17Jul 19, 2021Updated 4 years ago
- ☆760Aug 26, 2022Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- ☆31May 31, 2022Updated 3 years ago
- ☆10May 30, 2021Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Oct 2, 2021Updated 4 years ago
- This is a repository for network security tools and technologies.☆101Nov 6, 2022Updated 3 years ago
- Compilation of Resources from TCM's Practical Ethical Hacking Udemy Course☆124Feb 12, 2022Updated 4 years ago
- ☆33Aug 25, 2021Updated 4 years ago
- Cybersecurity Notes☆169Apr 11, 2024Updated 2 years ago
- An executable that simplifies adding the msds-AllowedToActOnBehalfOfOtherIdentity attribute for RBCD☆49Mar 10, 2025Updated last year
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- AWSGoat : A Damn Vulnerable AWS Infrastructure☆2,012May 20, 2025Updated 11 months ago
- GCP GOAT is the vulnerable application for learn the GCP Security☆71May 20, 2025Updated 11 months ago
- Regex patterns for manual application source code review☆33Dec 14, 2020Updated 5 years ago
- Blazing fast CTF platform from the future. This is a GitHub mirror of the GitLab repository (https://gitlab.com/Milkdrop/ctfx)☆16Oct 27, 2023Updated 2 years ago
- Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The…☆11Dec 8, 2021Updated 4 years ago
- Search security keys, domains, ip addresses in the APK project. You can also add to the search terms. If it finds leak data, you can have…☆18Nov 1, 2022Updated 3 years ago
- ☆489Aug 12, 2022Updated 3 years ago
- Python, C++ and Go☆22Sep 23, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆156Mar 27, 2023Updated 3 years ago
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 10 months ago
- Shellcode generation and encoding utility☆24Jul 13, 2022Updated 3 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆16Aug 16, 2022Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33May 1, 2022Updated 4 years ago
- ☆22Jul 13, 2022Updated 3 years ago