Herramientas y utilidades de pentesting, ethical hacking y seguridad ofensiva.
☆41May 26, 2025Updated 9 months ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- Simple shellcode injection in Nim encrypted in XOR☆22Aug 21, 2023Updated 2 years ago
- A basic proxylogon scanner☆27Aug 11, 2021Updated 4 years ago
- Beelzebub all in one Hacking Tools, Shell finder, Zone-H Grabber, ReverseIP, SMTP Finder, XMLRPC BF and more☆38May 27, 2025Updated 9 months ago
- A script that gives you the credentials of a Pterodactyl panel vulnerable to CVE-2025-49132☆17Jun 22, 2025Updated 8 months ago
- ☆14Updated this week
- host碰撞工具☆13May 22, 2023Updated 2 years ago
- ☆14Feb 23, 2026Updated last week
- ☆13Jan 17, 2025Updated last year
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- Apache HTTP-Server 2.4.49-2.4.50 Path Traversal & Remote Code Execution PoC (CVE-2021-41773 & CVE-2021-42013)☆12Aug 22, 2025Updated 6 months ago
- Taranis NG is an OSINT gathering and analysis tool for CSIRT teams and organisations. It allows team-to-team collaboration, and contains …☆10Oct 17, 2023Updated 2 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- A curated list of GPT agents for cybersecurity☆12Oct 2, 2024Updated last year
- An simplest PE parser, which list all import and export entries☆12Oct 11, 2018Updated 7 years ago
- A python module that accepts an HTTP request file and returns a dictionary of headers and post data☆43Oct 30, 2019Updated 6 years ago
- 域信息收集工具☆11Jun 5, 2023Updated 2 years ago
- Generate a unique ID, à la PHP☆13Mar 4, 2021Updated 5 years ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- A collection of the malware I use☆10Jul 24, 2024Updated last year
- SAOL wordlist 2018☆13Dec 8, 2022Updated 3 years ago
- ☆22Jul 1, 2025Updated 8 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Feb 3, 2024Updated 2 years ago
- Python script to get Samba Server Version☆11May 8, 2018Updated 7 years ago
- SPIP BigUp Plugin Unauthenticated RCE☆16Sep 7, 2024Updated last year
- A PoC exploit for CVE-2023-23752 - Joomla Improper Access Check in Versions 4.0.0 through 4.2.7☆16Feb 1, 2026Updated last month
- Attacking indiscriminately every header, cookie, GET and POST parameter with blind fury.☆13Sep 25, 2025Updated 5 months ago
- NeMo: a toolkit for conversational AI☆12Dec 23, 2022Updated 3 years ago
- A port scanner written in PowerShell☆13Apr 14, 2021Updated 4 years ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- This project accelerates deep learning models on the edge with the support of running ensemble learning for performance improvement. The …☆11Jun 21, 2022Updated 3 years ago
- ☆13Jun 26, 2025Updated 8 months ago
- 一个可以让 Bob 翻译使用大模型进行OCR的插件☆38Feb 2, 2025Updated last year
- upload a manim script and generate an animation☆11Mar 10, 2024Updated last year
- Interactsh deployment to AWS EC2 Instance with Terraform☆11Dec 29, 2021Updated 4 years ago
- Autonomous Multi-Agent Based Red Team Testing Service / AI hacker☆20Sep 15, 2025Updated 5 months ago
- ☆11Jun 8, 2022Updated 3 years ago
- Gitbook: OSCP-Jewels☆12Oct 19, 2021Updated 4 years ago
- POC for CVE-2020-9484☆13Feb 10, 2021Updated 5 years ago
- TechTalk: Procesamiento masivo de datos con Go y sync.Pool☆12Jan 28, 2022Updated 4 years ago