A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.
☆29Mar 17, 2026Updated this week
Alternatives and similar repositories for PenTestMethodology
Users that are interested in PenTestMethodology are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Noob Penetration tester☆11Jul 17, 2025Updated 8 months ago
- Hackers Hunter : Hunt down and track CTF Players & Bug Hunters etc accounts by username across in most places where you can find them☆17Feb 1, 2021Updated 5 years ago
- linux debugger☆11Sep 29, 2023Updated 2 years ago
- Run PowerShell command without invoking powershell.exe☆35Nov 22, 2021Updated 4 years ago
- scrapy website Article and link ...☆15Dec 13, 2020Updated 5 years ago
- A cover story generator for people who Need Quick Covers On Operations☆13May 17, 2020Updated 5 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 6 years ago
- Disable Windows Defender All Version☆31Jan 5, 2021Updated 5 years ago
- EDR Evasion - Combination of SwampThing - TikiTorch☆29May 28, 2020Updated 5 years ago
- Golang Direct Syscall☆31Sep 2, 2021Updated 4 years ago
- This Repository contains the stuff related to windows Active directory environment exploitation☆153Jul 31, 2023Updated 2 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Miscellaneous examples for use with Cobalt Strike Beacon☆10Nov 19, 2020Updated 5 years ago
- A tool designed to hook into Windows applications and output named (and anonymous?) pipe traffic.☆15Feb 27, 2024Updated 2 years ago
- Python3 Websocket AND http proxy☆43Dec 18, 2022Updated 3 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- ☆17Feb 4, 2020Updated 6 years ago
- Find exposed data in Azure with this public blob scanner☆352Jul 7, 2024Updated last year
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- ☆38Nov 27, 2020Updated 5 years ago
- Advanced Recon Tool☆26Aug 24, 2020Updated 5 years ago
- leaking net-ntlm with webdav☆26Feb 23, 2021Updated 5 years ago
- ☆12Aug 23, 2019Updated 6 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Sep 26, 2021Updated 4 years ago
- We publish our challenge questions for everyone.☆93Mar 15, 2021Updated 5 years ago
- ☆16Jul 11, 2021Updated 4 years ago
- A place for scripts that describe web exploits to live so they can be used in testing☆20Mar 11, 2013Updated 13 years ago
- C# .Net 5.0 project to build BOF (Beacon Object Files) in mass☆25Jul 25, 2023Updated 2 years ago
- Automating payload generation for OSEP labs and exam.☆34Jun 30, 2022Updated 3 years ago
- A Raytracing program from scratch in C language, with complex shapes, texture mapping, soft shadows, multiple lights and fractals.☆27Jun 16, 2024Updated last year
- A bash script that automates the scanning of a target network for HTTP resources through XXE☆37Dec 2, 2020Updated 5 years ago
- A Python based Web Application security scanner☆25Nov 26, 2020Updated 5 years ago
- Post-exploitation tool for attacking Active Directory domain controllers☆18Dec 18, 2022Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- 基于注册表劫持BypassUAC☆28Dec 16, 2020Updated 5 years ago
- Hide code from dnSpy and other C# spying tools☆42Oct 18, 2020Updated 5 years ago
- ABUSING WINDOWS TELEMETRY FOR PERSISTENCE☆140Jul 2, 2020Updated 5 years ago
- ☆11Jan 29, 2021Updated 5 years ago
- ☆12Nov 3, 2020Updated 5 years ago