S3cur3Th1sSh1t / awesome-pentestLinks
A collection of awesome penetration testing resources, tools and other shiny things
☆12Updated 5 years ago
Alternatives and similar repositories for awesome-pentest
Users that are interested in awesome-pentest are comparing it to the libraries listed below
Sorting:
- Email OSINT and password breach hunting. Use h8mail to find passwords through different breach and reconnaissance services, or the infamo…☆10Updated 6 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Updated 4 years ago
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆14Updated 5 years ago
- Custom pentesting tools☆14Updated 5 years ago
- General stuff for pentesting - password cracking, phishing, automation, Kali, etc.☆81Updated 5 years ago
- Advance Google Dorker and Vulnerability Scanner☆48Updated 6 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrator…☆14Updated 6 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Updated 6 years ago
- This Script Can Generate,Grab And Check Url's!☆11Updated 6 years ago
- A python program capable of accessing passwords associated with emails through leaked databases.☆21Updated last year
- Undetectable Windows Payload Generation☆10Updated 7 years ago
- Hacking Html Index For Web Site☆14Updated 7 years ago
- Windows Keylogger in C++☆19Updated 2 years ago
- Scripts to set up Kali Linux with additional tools, and maintain them.☆63Updated last year
- M0B tool v2 : exploit - brute force - website informations gathering - dork scanner with 9 search engines - full ip ports scanner - shell…☆14Updated 7 years ago
- Google hacking, also named Google dorking, is a hacker technique that uses Google Search and other Google applications to find security h…☆15Updated 4 years ago
- ~ Shell Finder By Ⓜ Ⓐ Ⓝ Ⓘ Ⓢ Ⓢ Ⓞ ☪ ~☆33Updated 7 years ago
- Fast exploitation based on metasploit.☆74Updated 5 years ago
- This is the list of all rootkits found so far on github and othersites.☆29Updated 4 years ago
- Google Hack Database dork automatic tool.☆24Updated 7 years ago
- BruteSploit is a collection of method for automated Generate, Bruteforce and Manipulation wordlist with interactive shell. That can be us…☆56Updated 7 years ago
- How cool would it be to learn Linux through the man pages To make it even more fun, I made this script with various options and with a co…☆25Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- 👨🏻💻 A great tool for Ethical Hackers, a malware programmed with Backdoor and Keylogger.☆41Updated 4 years ago
- Wordlists generated over the years of penetration testing☆12Updated 3 months ago
- Warning, almost everything in this Repo is MALWARE. I am using this to experiment with various functionality for the Hak5 USB Rubber Duck…☆26Updated 8 years ago
- Simple netcat-like binary for Windows, created with python and py2exe.☆13Updated 6 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆54Updated 4 years ago
- Twitter Eye is a Twitter Information Gathering Tool With Twitter Eye, you can search with various keywords and usernames on Twitter. Then…☆44Updated 4 months ago