PeCoReT / pecoretLinks
A Pentest Collaboration and Reporting Tool
☆63Updated 3 months ago
Alternatives and similar repositories for pecoret
Users that are interested in pecoret are comparing it to the libraries listed below
Sorting:
- A Powerful Network Reconnaissance Tool for Security Professionals☆101Updated 5 months ago
- Addon for BHCE☆47Updated 2 months ago
- Burp Suite extension for testing Passkey systems.☆69Updated 2 months ago
- Utility to craft HTML or SVG smuggled files for Red Team engagements☆243Updated last year
- Protection against HTML smuggling attacks.☆96Updated 2 weeks ago
- CaptainCredz is a modular and discreet password-spraying tool.☆114Updated 3 weeks ago
- Living Off Security Tools☆45Updated 7 months ago
- Tool created for Red Team to test default credentials on SSH and WinRM and then execute scripts with those credentials before the passwor…☆40Updated 2 years ago
- A Slack bot phishing framework for Red Teaming exercises☆167Updated last year
- Canary Detection☆182Updated last month
- AuditForge is a pentest reporting application making it simple and easy to write your findings and generate a customizable report.☆70Updated last week
- Crawlector is a threat hunting framework designed for scanning websites for malicious objects.☆126Updated last year
- AutoPwnKey is a red teaming framework and testing tool using AutoHotKey (AHK), which at the time of creation proves to be quite evasive. …☆85Updated 2 months ago
- Slides and Codes used for the workshop Red Team Infrastructure Automation☆185Updated last year
- Stalker, the Extensible Attack Surface Management tool.☆86Updated last week
- WolfPack combines the capabilities of Terraform and Packer to streamline the deployment of red team redirectors on a large scale.☆148Updated 2 weeks ago
- ☆159Updated last month
- AWS IAM Username Enumerator and Password Spraying Tool in Python3☆83Updated last month
- Burp Suite extension for bypassing client-side encryption for pentesting and bug bounty in WebSocket☆77Updated last month
- NullSection is an Anti-Reversing tool that applies a technique that overwrites the section header with nullbytes.☆65Updated last year
- Feed it a number. Your cloned voice does the social engineering, while you sip your coffee. A ghost that talks on the phone for you.☆93Updated 3 weeks ago
- ☆102Updated 2 months ago
- Ping-based Information Lookup and Outbound Transfer☆79Updated last year
- peeko – Browser-based XSS C2 for stealthy internal network exploration via infected browser.☆198Updated 2 months ago
- An offensive postexploitation tool that will give you complete control over the Outlook desktop application and therefore to the emails c…☆166Updated 8 months ago
- God Mode Detection Rules☆134Updated 10 months ago
- Email enumerator, username generator, and context validator for hunter.io, snov.io, and skrapp.io☆83Updated 10 months ago
- Azure mindmap for penetration tests☆185Updated last year
- Generate and Manage KeyCredentialLinks☆160Updated 3 weeks ago
- FrogPost: postMessage Security Testing Tool☆80Updated last month