Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free
☆22Jan 15, 2026Updated 2 months ago
Alternatives and similar repositories for pentestproxy
Users that are interested in pentestproxy are comparing it to the libraries listed below
Sorting:
- This repository contains a list of tools that may be useful for consultants performing penetration testing engagements.☆18Oct 11, 2019Updated 6 years ago
- Jok3r - Network and Web Pentest Framework☆17Apr 21, 2019Updated 6 years ago
- Windows Auto Post Exploitation - For ReD Team☆15Jul 21, 2019Updated 6 years ago
- A python server tool based on flask , this tool can phish some Facebook credentials!☆17Jun 22, 2019Updated 6 years ago
- The lazy box is developed for setting up a good testing environment for infosec peoples easily. Mostly this box has all the necessary lib…☆15Apr 11, 2022Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Nov 3, 2020Updated 5 years ago
- Enumerate a target Based off of Nmap Results☆76Oct 25, 2023Updated 2 years ago
- Journey to Try Harder !!!☆31Aug 30, 2019Updated 6 years ago
- IT Security tools☆12Nov 12, 2021Updated 4 years ago
- Cheatsheet collection of Infosec tools☆15May 18, 2019Updated 6 years ago
- ☆11Jun 18, 2025Updated 9 months ago
- Python Script to Crack Zip Password with Dictionary attack and also use Crunch as Pipeline☆38Jun 30, 2018Updated 7 years ago
- A multi-client reverse shell that allows multiple connections from target computers☆19Oct 25, 2025Updated 4 months ago
- CPH:SEC - Copenhagen Ethical Hacking and Penetration Testing Society☆44Oct 6, 2022Updated 3 years ago
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- SecRep Is a Repository That Contain Useful Intrusion, Penetration and Hacking Archive Including Tools List, Cheetsheet and Payloads☆19Jan 9, 2019Updated 7 years ago
- Package manager for hackers built by hackers☆36Aug 31, 2018Updated 7 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆55Oct 1, 2020Updated 5 years ago
- DNS logging, detection, ...☆15Mar 5, 2022Updated 4 years ago
- Python 3 server used to control SK8RAT implant☆36Jan 5, 2021Updated 5 years ago
- Monitoring Registry and File Changes in Windows☆70Jan 14, 2026Updated 2 months ago
- ☆17Dec 15, 2021Updated 4 years ago
- Shell utility to list colorfully show what processes are listening on what ports.☆19Aug 17, 2019Updated 6 years ago
- Porting BlueKeep PoC from @Ekultek to actual exploits☆11Jun 9, 2019Updated 6 years ago
- Black Hat Python workshop for Disobey 2019☆30Feb 19, 2019Updated 7 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆63Feb 24, 2020Updated 6 years ago
- Confirmed VPN client for macOS☆19Feb 11, 2021Updated 5 years ago
- A script to configure a TP-Link MR3040 running OpenWRT into a simple, yet powerful penetration-testing "dropbox".☆74Nov 12, 2024Updated last year
- Rosie the Pivoter☆17Sep 2, 2018Updated 7 years ago
- Bramble is a hacking Open source suite.☆84Jan 21, 2020Updated 6 years ago
- This script helps to pass through the captive portals in public Wi-Fi networks. It hijacks IP and MAC from somebody who is already connec…☆30May 10, 2018Updated 7 years ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- Self-Loading Registration Free COM Functions☆11Nov 12, 2019Updated 6 years ago
- C++ implant that interfaces with a SK8PARK server☆49Jun 28, 2021Updated 4 years ago
- ☆28Dec 28, 2017Updated 8 years ago
- Tools for working with files from Danganronpa V3 for PC☆34Jul 30, 2025Updated 7 months ago
- Experimenting with destructive file attacks in Go☆18May 20, 2019Updated 6 years ago
- Chatting with a single gmail draft via the Gmail API☆13Mar 10, 2020Updated 6 years ago
- ☆16May 6, 2015Updated 10 years ago