chrispetrou / pypentestingLinks
python tools to assist in penetration testing
☆14Updated last month
Alternatives and similar repositories for pypentesting
Users that are interested in pypentesting are comparing it to the libraries listed below
Sorting:
- PHP Phishing Framework☆28Updated 11 years ago
- only for 31337☆23Updated 8 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- Software exploitation training material☆16Updated 8 years ago
- Determine everything you need to know to about a system☆32Updated 6 years ago
- Unofficial WhatCMS API package☆42Updated 4 years ago
- ☆15Updated 2 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 6 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated 2 years ago
- GoPhish is a phishing script that enables rapid deployment of phishing sites.☆30Updated 6 years ago
- Tool to identify all domains contained in an IP anonymously☆15Updated 8 years ago
- ☆24Updated 9 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- Simple mods to wpa_supplicant to allow more efficient online bruting☆19Updated 6 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Updated 7 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Updated 9 years ago
- Framework for Man-In-The-Middle attacks☆16Updated 7 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 10 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Phishing Toolkit☆20Updated 7 years ago
- Search the ExploitDB with a little more control☆21Updated 8 years ago
- Data collection scripts for All Your Cloud Are Belong To Us conference talk☆29Updated 6 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- DPE - Default Password Enumeration☆35Updated 12 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 7 years ago