Misc resources for my daily pentesting...
☆19Mar 26, 2025Updated 11 months ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- ps-like .NET Assembly for enumerating processes on the current machine or a remote machine.☆13Aug 12, 2019Updated 6 years ago
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated last year
- 分布式漏扫框架☆17Nov 7, 2017Updated 8 years ago
- A collection of tricky (and sometimes) funny shellcodes☆24May 14, 2011Updated 14 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- Some of my Nmap scripts☆22Aug 3, 2017Updated 8 years ago
- Scans plugins directory for possible vulnerable plugins.☆22Dec 9, 2023Updated 2 years ago
- ZeroRemote Trojan SRC Extract☆19Mar 1, 2017Updated 8 years ago
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 3 years ago
- A simple shellcode runner☆22Apr 20, 2014Updated 11 years ago
- It is demonstration tool that contains collection techniques to detect the virtualisation environment in Linux Operating System.☆22Sep 23, 2018Updated 7 years ago
- Parse scan results into python objects, i.e. Nessus, Nmap, testssl, metasploit, ...☆23Jan 4, 2020Updated 6 years ago
- A vulnerable environment for exploring common GCP misconfigurations and vulnerabilities☆32Nov 12, 2025Updated 3 months ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆59Jun 11, 2019Updated 6 years ago
- A Beat that monitors a local Nessus reports directory and outputs scan results to Elasticsearch or Logstash.☆31Oct 1, 2017Updated 8 years ago
- NSA EquationGroup C&C Hunter using the Shodan API☆29Jul 8, 2015Updated 10 years ago
- A framework for automating penetration testing using a plugin based architecture☆41May 20, 2022Updated 3 years ago
- Post Exploitation Linux Toolkit☆33Oct 19, 2016Updated 9 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- ☆35Dec 3, 2024Updated last year
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆15May 3, 2014Updated 11 years ago
- A small two-file JSON serializer in C# that works on MonoDroid/MonoTouch☆11Jun 25, 2019Updated 6 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆86Sep 3, 2019Updated 6 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 20, 2026Updated last week
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Experimental examples of Ransomware in different languages☆37Nov 21, 2017Updated 8 years ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Curso realizado por Ricardo Narvaja de CrackLatinos (Mirror) http://ricardonarvaja.info☆12May 28, 2018Updated 7 years ago
- Find your router's default password☆14Apr 7, 2015Updated 10 years ago
- GUI Tool to Generate Android Payloads.☆10May 20, 2020Updated 5 years ago
- The knife of the Admin & Security auditor☆42Feb 12, 2020Updated 6 years ago
- ☆10Dec 5, 2023Updated 2 years ago