☆13Jan 25, 2020Updated 6 years ago
Alternatives and similar repositories for Awesome-Penetration-Testing
Users that are interested in Awesome-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- ☆10May 15, 2020Updated 5 years ago
- A collection of awesome penetration testing resources☆13Jan 13, 2019Updated 7 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Jan 15, 2022Updated 4 years ago
- Search-Scan-Save-Notify☆11May 12, 2025Updated 9 months ago
- Forensic Imaging quickstarts!☆13Aug 12, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Automatically deploy a Cuckoo sandbox☆23Jun 6, 2023Updated 2 years ago
- Automate the creation of Backdoors and postexplotation activities☆23Jun 20, 2022Updated 3 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- ☆48Jan 1, 2018Updated 8 years ago
- Capturing audio (.wav) from target using a link☆12Feb 21, 2020Updated 6 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- ☆10Sep 24, 2021Updated 4 years ago
- An SSH honeypot written entirely in Go.☆12Dec 4, 2025Updated 3 months ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Toutatis transform for maltego☆51Jan 10, 2023Updated 3 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago
- ELKFH - Elastic, Logstash, Kibana, Filebeat and Honeypot (HTTP, HTTPS, SSH, RDP, VNC, Redis, MySQL, MONGO, SMB, LDAP)☆47Apr 26, 2021Updated 4 years ago
- Yandex browser password recovery☆11Apr 9, 2025Updated 10 months ago
- Network Shredder IDS☆11Aug 14, 2024Updated last year
- A Multi-Processing Tool for collecting and extracting information to an Excel file from a Burp Suite output file.☆10Apr 8, 2024Updated last year
- Tool of the buttons for quick search keywords ans hashtags in 70 different social media platforms☆46Sep 7, 2023Updated 2 years ago
- ☆46Nov 5, 2025Updated 4 months ago
- InternetOff turns access to the Internet off and on again, without affecting access to the local network. It is a small program that work…☆13Jan 1, 2020Updated 6 years ago
- Wrapper for TSK (Sleuth Kit) Bindings☆12Jan 10, 2023Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Aug 18, 2022Updated 3 years ago
- Things long time missing from stdlib☆11Sep 27, 2021Updated 4 years ago
- Python based Web Scraper which can discover JavaScript files and parse them for juicy information (API keys, IP's, Hidden Paths etc)☆16Feb 17, 2022Updated 4 years ago
- A one stop shop for all cyber tooling, frameworks and hacking methodologies☆11Jul 25, 2021Updated 4 years ago
- Various scripts & tools☆12Apr 22, 2024Updated last year
- Malicious traffic detection system☆11Nov 2, 2022Updated 3 years ago
- Make level up and forgot about termux☆12Jan 29, 2021Updated 5 years ago
- Official repository of Fallout 13 [Release]☆11Dec 5, 2023Updated 2 years ago
- Encrypted DNS profiles for macOS and iOS☆10Jul 26, 2021Updated 4 years ago
- 🐍 Python Exploit for CVE-2022-0739☆11Dec 9, 2022Updated 3 years ago
- A set of tools that allow researchers to experiment with certificate chain validation issues☆13Dec 4, 2019Updated 6 years ago
- Maltego transforms for the Steam community☆12Aug 5, 2017Updated 8 years ago