Phenomite / poor-mans-pentest-notes
Notes for efficient and easier engagements - notes over time
☆23Updated 4 years ago
Alternatives and similar repositories for poor-mans-pentest-notes:
Users that are interested in poor-mans-pentest-notes are comparing it to the libraries listed below
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆39Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Simple passive Python Recon tool for subdomains enumeration with crt.sh☆20Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆39Updated 7 months ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated 2 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆47Updated last year
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆69Updated this week
- Tactics, Techniques, and Procedures☆25Updated 3 months ago
- Deepsearch leak database client, as an alternative for pwndb☆15Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- VLAN attacks toolkit☆14Updated 2 years ago
- ☆69Updated 2 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Updated 7 months ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆18Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Magicleaks it's a python script that checks if an email or a list of email accounts was compromised☆69Updated 3 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- Pentest stuff☆49Updated last year
- Automate All Pivoting System Enumeration with this Bash Script☆12Updated 2 years ago
- Python3 script to dump breach data from Dehashed☆28Updated 9 months ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆23Updated 3 years ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- wsvuls - website vulnerability scanner detect issues [ outdated server software and insecure HTTP headers.]☆54Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago