Phenomite / poor-mans-pentest-notes
Notes for efficient and easier engagements - notes over time
β21Updated 3 years ago
Related projects β
Alternatives and complementary repositories for poor-mans-pentest-notes
- Pivot your way deeper into computer networks with SSH compromised machines.β62Updated 2 years ago
- "π Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results stoβ¦β22Updated 9 months ago
- Interactive shell to execute commands anonymously using Proxychains and Torβ35Updated last year
- Small python script to look for common vulnerabilities on SMTP server.β46Updated 11 months ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.β38Updated last year
- Pentesting Tools to Automatize Active Directory Hackingβ14Updated 2 years ago
- π Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.shβ34Updated 2 years ago
- A semi-automatic osint/recon framework.β24Updated 6 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.β54Updated 2 years ago
- Ded Security Framework is a tool aimed at security professionalsβ32Updated 6 months ago
- Information Gathering Simplified.β61Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windowsβ16Updated 2 years ago
- Sifter - All purpose penetration testing op-centerβ75Updated 2 years ago
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.β21Updated 2 years ago
- Universal stealer malware logs parser. It retrieves all the compromised accounts and credit cards data from malware logs. Made for cyber β¦β58Updated last year
- web application pentesting tools for dockerβ17Updated 2 years ago
- Simple Tool for webhackingβ10Updated last year
- Hosted Reverse Shell generator with a ton of functionality. -- (Great for CTFs)β15Updated 4 months ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shellsβ¦β16Updated last year
- β53Updated last year
- C2 framework with modular and extensible architecture, task scheduler, remote shell live sessions and a retro look-feeling interface whicβ¦β39Updated 2 years ago
- Enumeration & fingerprint toolβ23Updated 8 months ago
- Collection of Cyber Threat Intelligence sources from the deep and dark webβ11Updated last month
- β27Updated 2 years ago
- Proof of concept denial of service over TOR stress test toolβ35Updated 6 years ago
- Automate All Pivoting System Enumeration with this Bash Scriptβ11Updated 2 years ago