Phenomite / poor-mans-pentest-notesLinks
Notes for efficient and easier engagements - notes over time
☆24Updated 4 years ago
Alternatives and similar repositories for poor-mans-pentest-notes
Users that are interested in poor-mans-pentest-notes are comparing it to the libraries listed below
Sorting:
- Sifter - All purpose penetration testing op-center☆81Updated 3 years ago
- Python3 script to dump breach data from Dehashed☆42Updated 7 months ago
- Small python script to look for common vulnerabilities on SMTP server.☆48Updated 2 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆65Updated 3 years ago
- A semi-automatic osint/recon framework.☆24Updated last year
- A multi threaded Python script designed to brute force directories and files names on webservers.☆80Updated 3 years ago
- A Discord Bot in Python for Hack The Box members.☆39Updated 5 years ago
- ☆72Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆64Updated 4 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Helping you delete your old accounts☆86Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆75Updated 4 months ago
- Create visualization from Shodan query☆75Updated 4 years ago
- JitterBug passively searches for Basic Info, open ports, potential CVE's on the given Target IP in third party databases without Direct i…☆13Updated 4 years ago
- Top password lists generated from leaks collected from different paste sites☆32Updated 3 years ago
- Bifrost C2. Open-source post-exploitation using Discord API☆48Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago
- Simple program to steal private files from removable storages☆86Updated last week
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆119Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- WolverineFramework - Free, OpenSource and easy to use Cybersecurity Framework.☆21Updated 3 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Malware written in bash to serve as an initial dropper script that will provide a strong foothold on the target device via reverse shells…☆21Updated 2 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago