PeCoReT / pecoret
A Pentest Collaboration and Reporting Tool
☆50Updated this week
Related projects ⓘ
Alternatives and complementary repositories for pecoret
- A Powerful Network Reconnaissance Tool for Security Professionals☆96Updated 4 months ago
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆46Updated this week
- Stalker, the Extensible Attack Surface Management tool.☆79Updated this week
- Living Off Security Tools☆41Updated 3 weeks ago
- ☆40Updated 2 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆77Updated 3 months ago
- Nuclei plugins to audit Chrome extensions☆64Updated 4 months ago
- A Caldera plugin for the emulation of complete, realistic cyberattack chains.☆44Updated 3 weeks ago
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆125Updated 11 months ago
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆116Updated 3 months ago
- Pivot from a Twitter profile to Medium, Product Hunt, Mastodon, and more with OSINT☆33Updated 8 months ago
- RedInfraCraft automates the deployment of powerful red team infrastructures! It streamlines the setup of C2s, makes it easy to create adv…☆90Updated last week
- A Slack bot phishing framework for Red Teaming exercises☆159Updated 6 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆229Updated 8 months ago
- Offensive Kubernetes Threat Matrix -- kubenomicon.com☆28Updated 2 weeks ago
- Canary Detection☆161Updated 7 months ago
- A BYOSI (Bring-Your-Own-Script-Interpreter) Rapid Payload Deployment Toolkit☆73Updated 3 months ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year
- Modular cross-platform Microsoft Graph API (Entra, o365, and Intune) enumeration and exploitation toolkit☆133Updated 3 months ago
- A comprehensive knowledge base for security professionals to keep track of and build defenses against API attack techniques.☆40Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆174Updated 7 months ago
- God Mode Detection Rules☆131Updated 3 months ago
- Static code analyser for backdoors and malicious code in git repos using OpenAI compatible LLM APIs☆69Updated 8 months ago
- Read Chromium data (namely, cookies and local storage) straight from disk, without spinning up the browser.☆111Updated 3 months ago
- Dredging up secrets from the depths of the file system☆116Updated 2 weeks ago
- Ping-based Information Lookup and Outbound Transfer☆75Updated 7 months ago
- Basic protection against HTML smuggling attempts.☆43Updated this week
- A tool collection for filtering and visualizing logon events. Designed to help answering the "Cotton Eye Joe" question (Where did you com…☆162Updated last week
- ServiceLens is a Python tool for analyzing services linked to Microsoft 365 domains. It scans DNS records like SPF and DMARC to identify …☆69Updated last month