R-Eric-Kiser / python-pentesting
Python Penetration Testing Tools
☆17Updated last year
Alternatives and similar repositories for python-pentesting:
Users that are interested in python-pentesting are comparing it to the libraries listed below
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆17Updated last year
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- ☆13Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 6 months ago
- your bestfried for finding LinkedIn Employees on github☆16Updated last year
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆17Updated 8 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- ☆24Updated last year
- Template Nuclei SSTI☆29Updated last year
- ☆16Updated last year
- Passworld is a fully customizable wordlist generator☆14Updated 5 months ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆25Updated last year
- Cobalt Strike BOFS☆15Updated last year
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- An issue discovered in Telesquare TLR-2005Ksh 1.0.0 and 1.1.4 allows attackers to run arbitrary system commands via the Cmd parameter.☆14Updated 9 months ago
- C2Matrix Automation☆12Updated last year
- A Python native library containing lots of useful functions to write efficient scripts to hack stuff.☆32Updated 3 weeks ago
- MacroExploit use in excel sheet☆20Updated last year
- ☆14Updated 11 months ago
- Open-Source Phishing Toolkit☆18Updated 3 years ago
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Simple recon tool automates your recon process☆16Updated last year
- Tools used for Pentesting☆22Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- ☆21Updated last year
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- Widget Options – The #1 WordPress Widget & Block Control Plugin <= 4.0.7 - Authenticated (Contributor+) Remote Code Execution☆11Updated 3 months ago