Wh1t3Rh1n0 / pentest-scriptsLinks
Miscellaneous scripts for pentesting
☆218Updated 7 years ago
Alternatives and similar repositories for pentest-scripts
Users that are interested in pentest-scripts are comparing it to the libraries listed below
Sorting:
- Active Directory Cheat Sheet☆144Updated 4 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆64Updated 6 years ago
- msImpersonate - User account impersonation written in pure Python3☆108Updated 3 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆99Updated 2 years ago
- ☆48Updated 4 years ago
- ☆31Updated 3 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆45Updated 5 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- ☆67Updated 3 years ago
- ☆85Updated 5 years ago
- ☆30Updated 5 years ago
- MayorSec DNS Enumeration Tool☆89Updated last year
- My Password Cracking Methodology☆83Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- m0chan.github.io☆88Updated 4 months ago
- ☆120Updated 3 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆62Updated 6 years ago
- Ansible playbook to deploy a phishing engagement in the cloud.☆223Updated 3 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆164Updated 5 months ago
- Active Directory Generator files for Movement, Pivoting, and Persistence for Pentesters and Ethical Hackers.☆217Updated 3 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Active Directory Lab for Penetration Testing☆54Updated 6 months ago
- Browser extension that extracts users from LinkedIn company pages☆164Updated 2 years ago
- ☆155Updated last month
- ☆76Updated 4 years ago
- Enumerate valid usernames from Office 365 using ActiveSync, Autodiscover v1, or office.com login page.☆292Updated last year
- ☆65Updated 5 years ago