Nieuport / Awesome-Penetration-Testing
☆14Updated 5 years ago
Alternatives and similar repositories for Awesome-Penetration-Testing:
Users that are interested in Awesome-Penetration-Testing are comparing it to the libraries listed below
- ☆11Updated 4 years ago
- A collection of awesome penetration testing resources☆14Updated 6 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆29Updated 3 years ago
- Web application pentesting recon☆23Updated 4 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆32Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated last year
- ☆46Updated 7 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- Octopus Hacking Tool Kit☆12Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 5 years ago
- ☆14Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Penetration Testing Checklist☆35Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆24Updated 2 years ago
- ☆43Updated 3 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆47Updated 4 years ago
- Resources for AD penetration testing and security☆29Updated 2 years ago
- ☆42Updated 8 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Mind Maps for penetration testing☆18Updated 3 years ago
- Threat Hunt Investigation Methodology and Procedure☆15Updated 2 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆62Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago