Nieuport / Awesome-Penetration-Testing
☆14Updated 5 years ago
Alternatives and similar repositories for Awesome-Penetration-Testing:
Users that are interested in Awesome-Penetration-Testing are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- A collection of awesome penetration testing resources☆14Updated 6 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- Awesome web penetration testing☆9Updated 6 years ago
- ☆29Updated 3 years ago
- ☆47Updated 7 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆18Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- ☆15Updated 3 years ago
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 9 months ago
- Resources for AD penetration testing and security☆30Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- ☆31Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆19Updated last year
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Mind Maps for penetration testing☆19Updated 4 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆50Updated 4 years ago
- Tactics, Techniques, and Procedures☆25Updated 2 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- ☆29Updated 3 years ago
- ☆43Updated 3 years ago
- ☆24Updated 3 years ago