Root-Down-Digital / pentesting-resourcesLinks
Pentest/Red Team: Resources, repos and scripts.
☆75Updated last month
Alternatives and similar repositories for pentesting-resources
Users that are interested in pentesting-resources are comparing it to the libraries listed below
Sorting:
- Automate Scoping, OSINT and Recon assessments.☆97Updated last week
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- G3nius Tools Sploit is a penetration testing tool with a lot of plugins for advanced cybersecurity attacks. User-friendly, Easy and modul…☆61Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Chrome extension tool for OSINT & Recon☆56Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Finds related domains and IPv4 addresses to do threat intelligence after Indicator-Intelligence collects static files.☆101Updated 11 months ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Discovering Typo Squatting on your domains!☆77Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆92Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆27Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- ☆65Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- Web Path Finder☆61Updated last year
- ☆24Updated last year
- Red Teaming tools and techniques☆55Updated 2 years ago
- Tools used for Pentesting☆21Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆50Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 6 months ago
- 🕵️ Email osint tool☆62Updated 2 years ago
- A repository with informtion related to Cloud Osint☆108Updated 6 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆112Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago