chrispetrou / pypentestingLinks
python tools to assist in penetration testing
☆14Updated 3 weeks ago
Alternatives and similar repositories for pypentesting
Users that are interested in pypentesting are comparing it to the libraries listed below
Sorting:
- PHP Phishing Framework☆28Updated 11 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Just another tool to screenshot web servers☆16Updated 2 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- Open-source Exploiting Framework☆30Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Automatically exported from code.google.com/p/surfjack - not actively maintained☆9Updated 10 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 12 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- ☆20Updated 5 years ago
- Generates payloads using msfvenom and open multi handler listener☆11Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 8 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- Automatically exported from code.google.com/p/yapscan☆11Updated 10 years ago
- only for 31337☆23Updated 8 years ago
- ☆15Updated 2 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 3 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 7 years ago
- PowerUpSQL: A PowerShell Toolkit for Attacking SQL Server☆8Updated 8 years ago
- Python tool for Dorking☆11Updated 2 years ago
- Data exfiltration PoC scripts☆24Updated 9 years ago
- An experimental shell that handles file exfiltration, exploit injection and various other obnoxious tasks.☆11Updated 4 years ago