PeCoReT / pecoret
A Pentest Collaboration and Reporting Tool
☆57Updated 2 weeks ago
Alternatives and similar repositories for pecoret:
Users that are interested in pecoret are comparing it to the libraries listed below
- A Powerful Network Reconnaissance Tool for Security Professionals☆100Updated 2 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆69Updated last month
- Stalker, the Extensible Attack Surface Management tool.☆83Updated this week
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆78Updated 7 months ago
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆75Updated last month
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆238Updated last year
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- Protection against HTML smuggling attempts.☆92Updated last week
- ☆52Updated 2 months ago
- Living Off Security Tools☆45Updated 4 months ago
- Hijack a slack bot to phish your way in☆55Updated 3 months ago
- Canary Detection☆164Updated 11 months ago
- 🎒 An up-to-date collection of precompiled binaries and hacking scripts.☆39Updated 2 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆147Updated this week
- Nuclei plugins to audit Chrome extensions☆64Updated 8 months ago
- A Slack bot phishing framework for Red Teaming exercises☆166Updated 10 months ago
- God Mode Detection Rules☆134Updated 7 months ago
- MailSecOps is an email and mail gateway security testing tool. With this script, you can perform mail spoofing, relay tests and security …☆53Updated 4 months ago
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆64Updated last year
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆163Updated 5 months ago
- Identify hardcoded secrets in static structured text (version 2)☆90Updated last month
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆180Updated 11 months ago
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆167Updated last month
- Find what egress ports are allowed☆39Updated 2 years ago