TiiZss / BreakingLabLinks
Bash script to manage insecure web apps using docker and hosts aliases for pentest practice
☆27Updated 6 months ago
Alternatives and similar repositories for BreakingLab
Users that are interested in BreakingLab are comparing it to the libraries listed below
Sorting:
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- ☆26Updated 2 years ago
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year
- This is an AD pentest tools collection☆57Updated 10 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆47Updated 2 weeks ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Powershell tools used for Red Team / Pentesting.☆76Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- Máquina virtual para investigaciones en fuentes abiertas OSINT☆18Updated 8 months ago
- ☆55Updated last year
- A tool to dump users's .plist on a Mac OS system and to convert them into a crackable hash☆51Updated 7 months ago
- Este proyecto implementa un poderoso túnel SSH totalmente anónimo utilizando la red Tor y múltiples proxies intermedios. Permite enrutar …☆14Updated last year
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- uCVE is a tool written in GO that allows to extract CVE's related to a specific software and version, obtaining a report in HTML format w…☆36Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- Automatic reverse/bind shell generator cheat sheet.☆35Updated 2 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- Chrome extension tool for OSINT & Recon☆53Updated last year
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- Azure Service Subdomain Enumeration☆60Updated 9 months ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Updated last year
- Discover WAF bypass vectors for any payload on any HTTP method, the civilized way.☆17Updated last month
- ☆21Updated this week
- It was developed to speed up the processes of SOC Analysts during analysis☆49Updated last year
- Herramienta en Bash ideal para extraer la información más relevante de un dominio vía rpcclient.☆18Updated last year
- This repository contains the best fuzzing wordlist files☆33Updated 6 months ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- ☆39Updated 5 months ago
- ☆93Updated last year