☆61Mar 16, 2018Updated 8 years ago
Alternatives and similar repositories for ptnotes
Users that are interested in ptnotes are comparing it to the libraries listed below
Sorting:
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Jun 3, 2016Updated 9 years ago
- A Bash script which uses AWS CLI to create an image of an AWS EC2 volume☆29Jan 1, 2024Updated 2 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- \ PowerAvails Powershell /☆10Jun 30, 2018Updated 7 years ago
- Universal Forensic Indexer and Analyzer☆10Jan 8, 2017Updated 9 years ago
- ☆12May 9, 2017Updated 8 years ago
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- Nix Audit made easier (RHEL, CentOS)☆65Apr 22, 2025Updated 10 months ago
- A testing framework for mail security and filtering solutions.☆245Jul 24, 2023Updated 2 years ago
- ☆29Apr 20, 2018Updated 7 years ago
- Phishing Toolkit☆19Feb 20, 2018Updated 8 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- Perform Static and dynamic analysis on 32 bit ELF binary, and automate the process of stack based overflow exploitation.☆46Aug 18, 2019Updated 6 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- A full example report☆11Jul 23, 2019Updated 6 years ago
- Pown.js is a security testing an exploitation toolkit built on top of Node.js and NPM.☆261Apr 7, 2023Updated 2 years ago
- Risu is Nessus parser, that converts the generated reports into a ActiveRecord database, this allows for easy report generation and vulne…☆63Nov 24, 2025Updated 3 months ago
- Monitor JSON notifications feed from VT☆17Jun 13, 2017Updated 8 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆18Mar 3, 2021Updated 5 years ago
- python based backdoor software☆17Oct 14, 2011Updated 14 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆501Aug 7, 2020Updated 5 years ago
- Issues to consider when planning a red team exercise.☆614Aug 23, 2017Updated 8 years ago
- Open-source pentesting management and automation platform by Salesforce Product Security☆599Feb 12, 2022Updated 4 years ago
- Detect malicious domain, Blablablablabla☆27Jan 8, 2017Updated 9 years ago
- Python scraper that grabs user agent strings and populates them into sqlite/JSON files☆29Jul 20, 2017Updated 8 years ago
- Various Cheat Sheets related to development and security☆144Jul 16, 2020Updated 5 years ago
- A collection off SVG for Home Assistant☆13Apr 25, 2025Updated 10 months ago
- Real Time Threat Monitoring Tool☆114Nov 16, 2022Updated 3 years ago
- FireShodanMap is a Realtime map that integrates Firebase, Google Maps and Shodan. A search is carried out using Shodan searching vulnerab…☆126May 25, 2018Updated 7 years ago
- The currently released SimpleRisk source code.☆100Mar 3, 2026Updated 2 weeks ago
- Ingests logs/dbs from cobalt and empire and outputs an excel report with activity, sessions, and credentials☆21Dec 3, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- SimplE RePort wrIting and COllaboration tool☆1,111May 3, 2020Updated 5 years ago
- Malice Office/OLE/RTF Plugin☆13Aug 29, 2018Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆378Oct 12, 2020Updated 5 years ago
- ☆83Jan 29, 2016Updated 10 years ago
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Simple tool collection for escalation to NT AUTHORITY\SYSTEM from recently disclosed Steam Client Zero Day☆38Aug 12, 2019Updated 6 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago