Nieuport / Awesome-Penetration-TestingLinks
☆14Updated 5 years ago
Alternatives and similar repositories for Awesome-Penetration-Testing
Users that are interested in Awesome-Penetration-Testing are comparing it to the libraries listed below
Sorting:
- ☆11Updated 5 years ago
- A collection of awesome penetration testing resources☆14Updated 6 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆20Updated 2 years ago
- ☆48Updated 7 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- ☆31Updated 4 years ago
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆22Updated 2 years ago
- Repository and archive for Killing The Bear Gitbook☆84Updated 2 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- Resources for AD penetration testing and security☆33Updated 3 years ago
- Create visualization from Shodan query☆76Updated 4 years ago
- Forensic Imaging quickstarts!☆14Updated 3 years ago
- ☆19Updated 4 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆53Updated 5 years ago
- Useful commands for pentesting Linux and Windows systems☆14Updated 5 years ago
- A list of awesome penetration testing tools and resources.☆82Updated 2 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆17Updated last month
- This contains a list of Blue Team Tools that I use daily, and have stored here for reference.☆35Updated 8 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆75Updated 4 years ago
- ☆45Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆51Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆97Updated 2 years ago
- ☆32Updated 4 years ago
- Passive subdomain enumeration tool with http-probe.☆33Updated 4 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Updated 2 months ago