A currated list of pentest tools that are in active use by the twitter infosec community.
☆42Dec 29, 2019Updated 6 years ago
Alternatives and similar repositories for PenTestTools
Users that are interested in PenTestTools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Qbittorrent personal search engines☆11Aug 19, 2025Updated 7 months ago
- Audits AD hashdump and looks for instances for password reuse☆12Nov 12, 2019Updated 6 years ago
- Splunk TA for alert action to TheHive-project☆11May 13, 2020Updated 5 years ago
- CloudFlare Worker Shell☆14Aug 29, 2020Updated 5 years ago
- Tartocitron is a repo to have fun with malwares and the Rust language. This repo provides working examples of dropper written in Rust.☆11May 31, 2022Updated 3 years ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆42Aug 10, 2025Updated 7 months ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- ☆11Jan 12, 2026Updated 2 months ago
- Tool searching for different default passwords.☆16Jan 27, 2022Updated 4 years ago
- ☆12Dec 26, 2022Updated 3 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆471Nov 14, 2019Updated 6 years ago
- inline latex preview for emacs using org-mode☆17Mar 17, 2017Updated 9 years ago
- A Rust malware controlled by a Go web interface, API and socket server.☆10Aug 22, 2022Updated 3 years ago
- A collection of XSS Attack vectors☆10Apr 26, 2025Updated 10 months ago
- misc pentest tools.☆26Dec 16, 2014Updated 11 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- My collection of self-written exploits☆24Mar 25, 2022Updated 3 years ago
- Encrypt your password or decrypt your hash. Multiple algorithms supported.☆19Feb 1, 2017Updated 9 years ago
- ⚑ We put the "ethical" in "ethical hacking." ⚑☆13Feb 14, 2021Updated 5 years ago
- I've described several Network Tunneling methods in this repository. Hope you enjoy it! #maytheforcebewithyou☆32Aug 27, 2019Updated 6 years ago
- wireless client identification☆18Nov 26, 2014Updated 11 years ago
- ☆12Jul 7, 2023Updated 2 years ago
- ☆20Jun 26, 2024Updated last year
- Resolvn Threat Hunting Virtual Machine☆139Aug 16, 2019Updated 6 years ago
- Resources I've found useful for my CTI work☆12Dec 27, 2023Updated 2 years ago
- OhNo - The Evil Image Builder & Meta Manipulator☆11Jun 5, 2014Updated 11 years ago
- ☆13Sep 8, 2024Updated last year
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- Patch a Windows PE (.exe, .dll, etc..) so it no longer loads with a random dynamic base. Saves changing breakpoint addresses between debu…☆15Apr 5, 2020Updated 5 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 11 years ago
- A tool to calculate big numbers, perform hashing and encodings.☆19May 29, 2017Updated 8 years ago
- ☆10Jul 19, 2019Updated 6 years ago
- Determine the Version Running on the Palo Alto Network Firewall for the Global Protect Portal☆13Aug 14, 2020Updated 5 years ago
- Forensic cheatsheets for use with cheat☆15Dec 2, 2021Updated 4 years ago
- A python based utility to download animes for offline viewing ¯\(ツ)/¯☆13Mar 22, 2021Updated 5 years ago
- Repository for hosting the MITRE Cyber Academy website.☆11Apr 12, 2023Updated 2 years ago
- Zeek package for tracking long connections to report them before they have completed.☆31Nov 25, 2025Updated 3 months ago