A currated list of pentest tools that are in active use by the twitter infosec community.
☆42Dec 29, 2019Updated 6 years ago
Alternatives and similar repositories for PenTestTools
Users that are interested in PenTestTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Qbittorrent personal search engines☆11Aug 19, 2025Updated 8 months ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- A JavaScript plugin for jog dial controls.☆81Mar 29, 2021Updated 5 years ago
- A script to automate Jenkins credential store decryption☆17May 29, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Perform vulnerabilities lookup on Vulners, the largest vulnerabilities & exploits database☆17Dec 8, 2019Updated 6 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 8 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆472Nov 14, 2019Updated 6 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆37Aug 13, 2018Updated 7 years ago
- My collection of self-written exploits☆24Mar 25, 2022Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Sends public ip through e-mail. Command-line standalone.☆12Sep 22, 2017Updated 8 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Feb 1, 2017Updated 9 years ago
- I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou☆32Aug 27, 2019Updated 6 years ago
- A script to assist in processing forensic RAM captures for malware triage☆26Feb 4, 2021Updated 5 years ago
- ☆20Jun 26, 2024Updated last year
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- Resolvn Threat Hunting Virtual Machine☆138Aug 16, 2019Updated 6 years ago
- ☆13Sep 8, 2024Updated last year
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- Tutorials showing how to create animations with the U8g2 Library. Also includes a simple animation library allowing you to use simple non…☆10Feb 2, 2026Updated 3 months ago
- wireless client identification☆19Nov 26, 2014Updated 11 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 6 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- A collection of shellcode hashes☆17Aug 15, 2018Updated 7 years ago
- A tool for recovering server credentials from a pgadmin4 database☆19Oct 16, 2021Updated 4 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 5 months ago
- A fully featured backdoor that uses Gmail as a C&C server☆19Oct 13, 2015Updated 10 years ago
- Webapplication Honeypot☆16May 12, 2013Updated 12 years ago
- This directory contains presentations and related materials of my speaking engagements. I also use this to record historical presentation…☆17Feb 13, 2025Updated last year
- Mass zone transfer python script☆16May 26, 2016Updated 9 years ago
- Unifi Images☆27Apr 4, 2025Updated last year
- Maltego integration of https://haveibeenpwned.com☆62Mar 12, 2025Updated last year