Misc resources for my daily pentesting...
☆19Mar 26, 2025Updated last year
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Vulnerability consolidation and management tool, enhances scan results by merging different findings of the same weakness across multiple…☆24Dec 16, 2022Updated 3 years ago
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- An nmap script to produce target lists for use with various tools.☆33May 13, 2021Updated 5 years ago
- Python module to help in exploitation of the FILE structure in C☆27Dec 2, 2018Updated 7 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Apr 6, 2024Updated 2 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- ansible roles to download and install empire (BC-Security),deathstar(byt3bl33der) and starkiller (BC-Security)☆24May 8, 2022Updated 4 years ago
- 超精简的POC扫描框架☆10Aug 5, 2019Updated 6 years ago
- nse script to inject jndi payloads☆47Dec 13, 2021Updated 4 years ago
- Telco training☆26Oct 17, 2018Updated 7 years ago
- Miscellaneous tools for BloodHound☆19Jan 26, 2022Updated 4 years ago
- Automated process to build and distribute Posture & Exposure Reports' bi-weekly to customers.☆16Jul 16, 2025Updated 10 months ago
- Public testing data. Samples of log4j library versions to help log4j scanners / detectors improve their accuracy for detecting CVE-2021-…☆14Dec 30, 2021Updated 4 years ago
- ☆13Dec 26, 2022Updated 3 years ago
- Some of my Nmap scripts☆23Aug 3, 2017Updated 8 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated 2 months ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- A software tool kit to help identify quickly what's inside your binary files.☆14Dec 9, 2024Updated last year
- A fully automatic CVE-2019-0841 bypass targeting all versions of Edge in Windows 10.☆58Jun 11, 2019Updated 6 years ago
- Chain-of-thought 방식을 활용하여 llama2를 fine-tuning☆10Nov 18, 2023Updated 2 years ago
- Sandbox escape using WinHTTP Web Proxy Auto-Discovery Service☆85Sep 3, 2019Updated 6 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- log4j PowerShell Checker☆18Dec 13, 2021Updated 4 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Official write-up for Speed Hack event at POC2017☆13Nov 11, 2017Updated 8 years ago
- 分布式漏扫框架☆17Nov 7, 2017Updated 8 years ago
- ☆35Jan 22, 2025Updated last year
- Information Repository on Various Methods of getting shell access into a Windows machine☆17Feb 11, 2020Updated 6 years ago
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Active Directory ACL exploitation with BloodHound☆14May 18, 2021Updated 5 years ago
- Make ARM Shellcode Great Again☆62Apr 8, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 8 years ago
- An unofficial Humax IR4000HD terminal client with enhanced features.☆10Feb 2, 2019Updated 7 years ago
- Examples in "Rust Essentials" Book☆10Jun 17, 2016Updated 9 years ago
- Leveraging CVE-2018-19788 without root shells☆19Dec 18, 2018Updated 7 years ago