Penetration Testing with Kali Linux
☆22Oct 18, 2019Updated 6 years ago
Alternatives and similar repositories for PentesterOps
Users that are interested in PentesterOps are comparing it to the libraries listed below
Sorting:
- Various scripts & tools☆12Apr 22, 2024Updated last year
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- A Python Typer-based CLI tool to generate fake data for Azure AD. AzDummy also uses Rich for some dope console output.☆13Apr 27, 2021Updated 4 years ago
- Some of my flag protected writeups☆11Apr 13, 2020Updated 5 years ago
- Some Hashcat Rules for 2020 and beyond. Contributions encouraged!☆26May 26, 2022Updated 3 years ago
- ☆16Dec 7, 2025Updated 2 months ago
- PSAttck is a light-weight framework for the MITRE ATT&CK Framework.☆38Jan 11, 2022Updated 4 years ago
- Bluecoat proxies URL filtering bypass PoC☆14May 19, 2015Updated 10 years ago
- A CHaracter Aware Splitting Method for producing password candidates.☆43Apr 17, 2018Updated 7 years ago
- Set of ultra technical notes about AD☆18Jun 17, 2018Updated 7 years ago
- pentest scripts☆20Jul 28, 2020Updated 5 years ago
- This is a hash parser that will export a rc file compatible with Metasploit. This is useful when compromising a separate domain and want …☆22Oct 8, 2014Updated 11 years ago
- Various Python scripts that have come in handy but aren't important enough to get their own repository☆22Feb 18, 2021Updated 5 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆31Jul 19, 2024Updated last year
- LAPS module for CrackMapExec☆29Oct 20, 2021Updated 4 years ago
- A quick-and-easy bash script installing and launching EvilGinx2, a phishing reverse-proxy☆29Feb 27, 2019Updated 7 years ago
- A useful reference guide and a handbook of security basics for those starting out.☆23Nov 18, 2017Updated 8 years ago
- ☆115Jul 18, 2019Updated 6 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 4 years ago
- ☆28Jan 6, 2024Updated 2 years ago
- A docker container for running the hashcat brain server☆25May 14, 2019Updated 6 years ago
- A Canary which fires when uninstalled☆34Mar 16, 2021Updated 4 years ago
- S3 bucket enumerator☆30Apr 7, 2019Updated 6 years ago
- ☆10Updated this week
- Build a domain with three quick PowerShell scripts!☆29Jun 3, 2020Updated 5 years ago
- Attack Team Automation Tool - for automating penetration testing operations with industry standard tools.☆34Dec 4, 2023Updated 2 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- Perform Windows domain enumeration via LDAP☆37Jun 7, 2022Updated 3 years ago
- Clean public password dump files and store in ELK☆37Jan 24, 2018Updated 8 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Tools By Pro For Termux☆24Jul 17, 2022Updated 3 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Writeups for Vulnhub, Tryhackme and Others☆13Jun 25, 2023Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Dec 20, 2020Updated 5 years ago
- a smart DNS response-guided subdomain fuzzer☆156Jan 3, 2023Updated 3 years ago
- ☆138May 17, 2017Updated 8 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆98Sep 27, 2021Updated 4 years ago
- Add SD for controlled computer object to a target object for RBCD using LDAP☆37Oct 28, 2021Updated 4 years ago
- A program to map out SPF and DKIM records for a large number of domains☆39Apr 1, 2015Updated 10 years ago