chrispetrou / pypentesting
python tools to assist in penetration testing
☆14Updated 4 months ago
Related projects ⓘ
Alternatives and complementary repositories for pypentesting
- Python driver for Wappalyzer, a web application detection utility.☆10Updated 4 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆13Updated 6 years ago
- MS17-010☆12Updated 7 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆22Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Vulnerability Scanner☆12Updated 9 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- PHP Phishing Framework☆28Updated 10 years ago
- SPIZZLE, The Onion Spider.☆13Updated 6 years ago
- :e-mail: Enumerate usernames through SMTP service☆18Updated 5 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 7 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- A pyobfuscate fork made specifically to randomize and obfuscate python based payloads☆13Updated 9 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 4 years ago
- Software exploitation training material☆15Updated 7 years ago
- ☆15Updated last year
- Simple mods to wpa_supplicant to allow more efficient online bruting☆18Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Updated 5 years ago
- Use regular expressions to get sensitive information from a given repository (GitHub, pip or npm).☆35Updated 5 years ago
- Converts Half-WPA handshake to hashcat☆17Updated 6 years ago
- PDF report generator for basic recon☆9Updated 6 years ago
- Red Teaming with Kali Linux. OS Customization, additional tools, and automated updates☆12Updated 8 years ago
- Collection of Nmap scripts☆10Updated 8 years ago
- Checks if a windows machine with the smb service actve is vulnerable to the CVEs of a CSV file passed as argument to the script☆12Updated 2 years ago
- ☆12Updated 6 years ago