Some scripts and PoCs I'm using in pentesting.
☆49Dec 10, 2020Updated 5 years ago
Alternatives and similar repositories for pentest-scripts
Users that are interested in pentest-scripts are comparing it to the libraries listed below
Sorting:
- Script to scan OpenSSH host key and known_hosts files for shared keys from server hoster Hetzner☆19Jan 1, 2016Updated 10 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Fork of http://sourceforge.net/projects/python-irclib/, mainly so I can install it with pip.☆21Jun 22, 2016Updated 9 years ago
- It's an RSA-cracker, that uses Fermat's factorization method to get p and q.☆15Dec 19, 2015Updated 10 years ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- Web-app to identify the different types of hashes☆20Aug 26, 2023Updated 2 years ago
- collection of pentest tools☆26Aug 4, 2019Updated 6 years ago
- Screenshot Shenanigans☆26Nov 20, 2017Updated 8 years ago
- ☆25Jul 8, 2015Updated 10 years ago
- Linux install and network setup for SNAPS☆14Sep 7, 2019Updated 6 years ago
- Random Hashcat Scrips☆36Oct 12, 2024Updated last year
- A 'Universal WHOIS' proxy server - you query it, it gives back the correct details☆42Nov 29, 2025Updated 3 months ago
- Analyze and modify hashcat .restore files☆33Nov 19, 2022Updated 3 years ago
- A stand-alone implementation of Hashcat's rule engine☆35Sep 16, 2016Updated 9 years ago
- Simple embedded web application in Ruby for use in Android Devices☆27Sep 2, 2010Updated 15 years ago
- Mr.Robot - DIY Self Balancing Robot Project☆10Oct 25, 2017Updated 8 years ago
- Nmap GUI with SearchSploit and vulnerability script integrations, schedules, and reports☆12Dec 22, 2025Updated 2 months ago
- Create database files for the genealogytree LaTeX package from GEDCOM files☆11Mar 11, 2025Updated 11 months ago
- developing clonning commands in termux for clonning☆13Mar 7, 2020Updated 6 years ago
- ☆12Jun 13, 2023Updated 2 years ago
- An nmap script to produce target lists for use with various tools.☆33May 13, 2021Updated 4 years ago
- Operational toolset utilizing git's submodule feature☆57Feb 6, 2013Updated 13 years ago
- A collection of hashcat-hcstat files☆33Feb 13, 2018Updated 8 years ago
- The spell program from the 10th Edition Unix system☆10Jul 12, 2020Updated 5 years ago
- A scanner for DKIM selectors.☆12Nov 5, 2018Updated 7 years ago
- Text file containing NSFW words aggregated from various sources.☆10Aug 23, 2020Updated 5 years ago
- an AI messenger bot made with Flask!☆10May 11, 2017Updated 8 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- This is a Packet flooder python program, This tool is created by 47hxl-53r, This tool is created only for educational purposes, Creator …☆10May 5, 2022Updated 3 years ago
- Controlling your MSR with Visual Basic 6☆19Jul 1, 2015Updated 10 years ago
- Silly Android app to bypass stupid Facebook's limitation that forces user to use Messenger app to chat with contacts, instead of normal b…☆10Jun 15, 2016Updated 9 years ago
- Simple Linux RootKit written in python☆10Dec 10, 2017Updated 8 years ago
- A Slack bot designed to drive PAX engagement in your F3 region!☆11May 22, 2025Updated 9 months ago
- Walkie Talkie with Arduino Nano and nRF24L01☆10Sep 16, 2022Updated 3 years ago
- MindShare☆10Dec 18, 2023Updated 2 years ago
- morphHTA - Morphing Cobalt Strike's evil.HTA☆10Jun 3, 2017Updated 8 years ago
- Wordlist and hashcat ruleset for cracking the default netgear WPA passphrase☆42Jun 2, 2021Updated 4 years ago
- WMkick is a TCP protocol redirector/MITM tool that targets NTLM authentication message flows in WMI (135/tcp) and Powershell-Remoting/WSM…☆42Aug 2, 2021Updated 4 years ago
- Ucki's Recon & Enumeration Pack☆39May 9, 2016Updated 9 years ago