This is a bundle of python and bash penetration testing tools for recon and information gathering.
☆80Dec 17, 2015Updated 10 years ago
Alternatives and similar repositories for PenTools
Users that are interested in PenTools are comparing it to the libraries listed below
Sorting:
- List of penetration testing tools.☆23Mar 25, 2020Updated 5 years ago
- A sample vulnerable driver that emulates kernel mode vulnerabilities.☆20Jan 30, 2016Updated 10 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Dec 16, 2015Updated 10 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆195Jun 23, 2019Updated 6 years ago
- Recon, Subdomain Bruting, Zone Transfers☆229Aug 2, 2016Updated 9 years ago
- A tool to generate log messages related to interfaces, neighbor cache (ARP,NDP), IP address, routing, FIB rules, traffic control.☆32Oct 7, 2024Updated last year
- Reverse Engineering and Exploit Development stuff☆31Mar 8, 2018Updated 7 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- .NET ASP.NET Security Analyser - Consolidation of multiple ASP.NET OWASP tools☆15Apr 25, 2015Updated 10 years ago
- A small Php package to fetch archive url snapshots from archive.org. Using it you can fetch complete list of snapshot urls of any year or…☆19Jun 20, 2021Updated 4 years ago
- A security write-up about the Paypal API & data leakage☆25May 27, 2016Updated 9 years ago
- Tools for attacking cryptographic implementations.☆21Oct 27, 2016Updated 9 years ago
- Self contained cross platform DNS recon tool☆187Jul 20, 2017Updated 8 years ago
- Python and Powershell internal penetration testing framework☆720Feb 22, 2016Updated 10 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- A repository for large scripts from my book.☆160Oct 1, 2021Updated 4 years ago
- XXE attack tool☆31Feb 20, 2016Updated 10 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Dec 11, 2015Updated 10 years ago
- CTF & practice exploit collection☆38Nov 30, 2016Updated 9 years ago
- A Powershell exploit service that opens a reverse http connection via meterpreter☆118Feb 25, 2023Updated 3 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- ☆83Feb 3, 2017Updated 9 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- Cronbased Dirty Cow Exploit☆30Jan 30, 2017Updated 9 years ago
- outis is a custom Remote Administration Tool (RAT) or something like that. It was build to support various transport methods (like DNS) a…☆126Sep 19, 2017Updated 8 years ago
- Detects DLL hijacking in running processes on Windows systems☆156Apr 2, 2015Updated 10 years ago
- Blind SQL injection exploitation tool written in ruby.☆99Dec 1, 2024Updated last year
- PFI (Port Forwarding Interceptor)☆46Jan 29, 2026Updated last month
- Pentest tool for antivirus evasion and running arbitrary payload on target Wintel host☆175May 6, 2016Updated 9 years ago
- A tool to perform automated forensic analysis of Chrome Browser.☆33Feb 2, 2017Updated 9 years ago
- Penetration testing automation toolkit☆22Jul 4, 2015Updated 10 years ago
- A tool to perform various OSINT techniques, aggregate all the raw data, visualise it on a dashboard, and facilitate alerting and monitori…☆31Apr 22, 2018Updated 7 years ago
- Analysing Reddit user data.☆12May 5, 2014Updated 11 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- ☆77Jul 4, 2019Updated 6 years ago
- A tool to generate graph and other output from NMAP XML files☆116Mar 9, 2019Updated 6 years ago
- A Windows priviledge escalation tool (abusing race conditions)☆79Sep 29, 2015Updated 10 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 7 years ago