Penetration Testing with Kali Linux
☆22Oct 18, 2019Updated 6 years ago
Alternatives and similar repositories for PentesterOps
Users that are interested in PentesterOps are comparing it to the libraries listed below
Sorting:
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- ☆12Apr 17, 2022Updated 3 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆23Oct 8, 2014Updated 11 years ago
- Xcrafter is a portable Excel Open XML format command line file crafter. Xcrafter allows you to create xsls files and embed payloads, like…☆13Jun 30, 2020Updated 5 years ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- ☆139May 17, 2017Updated 8 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Scripts and One-Liners☆20Jan 31, 2025Updated last year
- Hacking Tools☆51Aug 14, 2018Updated 7 years ago
- ☆11Dec 27, 2023Updated 2 years ago
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- ☆14Dec 3, 2020Updated 5 years ago
- SpiderFoot automates OSINT collection so that you can focus on analysis.☆11Apr 20, 2023Updated 2 years ago
- My linux config files☆10Updated this week
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆14Jan 9, 2019Updated 7 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- Sublime Text Linux Installer☆39May 26, 2021Updated 4 years ago
- Query accurate gas prices on every blockchain network ⛽️☆13Jun 16, 2023Updated 2 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- static tor + sshd for reverse shell debugging of CI containers and other natted environments☆17Nov 30, 2022Updated 3 years ago
- certstream + analytics☆11Jan 17, 2020Updated 6 years ago
- Tools By Pro For Termux☆24Jul 17, 2022Updated 3 years ago
- rotating proxy server☆11Sep 17, 2024Updated last year
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 7 years ago
- Reads in a list of domains or subdomains and crawls them for references to S3 buckets☆10Nov 21, 2023Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- All Base libraries decryption tool☆14Jan 2, 2022Updated 4 years ago
- ☆12Feb 20, 2025Updated last year
- WaybackRust is a tool written in Rust to query the WaybackMachine.☆14Jul 18, 2025Updated 8 months ago
- My C projects☆16May 27, 2022Updated 3 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- Decentralized telecom ecosystem and customizable Bubbletone (TM) mobile app provide easy management of mobile profiles.☆10Nov 21, 2019Updated 6 years ago
- Various exploits☆10Apr 27, 2017Updated 8 years ago