S3cur3Th1sSh1t / awesome-pentestLinks
A collection of awesome penetration testing resources, tools and other shiny things
☆12Updated 5 years ago
Alternatives and similar repositories for awesome-pentest
Users that are interested in awesome-pentest are comparing it to the libraries listed below
Sorting:
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- Get files from Android directories☆11Updated 6 years ago
- Proxy Helper is a WiFi Pineapple module that will automatically configure the Pineapple for use with a proxy such as Burp Suite.☆38Updated 2 years ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆81Updated 5 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- USB-Rubber-Ducky-Arduino-New-Payloads☆13Updated 6 years ago
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11Updated 2 years ago
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Wiki to collect Red Team infrastructure hardening resources☆20Updated 7 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 5 years ago
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆63Updated last year
- Just a better dirbuster☆13Updated 2 years ago
- Hacking Tools For All Debian-based OS☆51Updated 7 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- ☆17Updated 7 years ago
- Search for leaked creadentials on pwndb using the command line and tor.☆24Updated 6 years ago
- PowerSploit - A PowerShell Post-Exploitation Framework☆18Updated 5 years ago
- Metasploit/MSFVenom Payload Generator Stand Alone☆32Updated 8 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- SimpleEmail is a email recon tool that is fast and easy framework to build on☆44Updated 9 years ago
- Combined Worldlist from various projects Including Seclists, fuzzdb and other Database Management Tools☆18Updated 5 years ago
- Fast subdomains enumeration tool for penetration testers☆15Updated 5 years ago
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Updated 6 years ago
- Custom pentesting tools☆14Updated 5 years ago
- Attack and defend active directory using modern post exploitation adversary tradecraft activity☆12Updated 4 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆55Updated 7 years ago