coreb1t / mobile-pentest-toolkit
☆18Updated last year
Alternatives and similar repositories for mobile-pentest-toolkit:
Users that are interested in mobile-pentest-toolkit are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- hostapd and wpa_supplicant 2.7 vulnerable to Mathy's WPA3 bugs☆23Updated 5 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated 2 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Cryptocurrencies related Security resources☆14Updated last year
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Light System Examination Toolkit (LISET) - logs & activity & configuration gathering utility that comes handy in fast Windows incident re…☆29Updated 8 years ago
- Software exploitation training material☆15Updated 7 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- only for 31337☆22Updated 8 years ago
- Exploits developped by Outflank B.V. team members☆20Updated 8 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Miscellaneous exploit scripts☆17Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- ☆15Updated 2 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- ☆20Updated 5 years ago
- Oracle Attacks Tool☆13Updated 8 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Basic tool to automate backdooring PE files☆54Updated 3 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- Interactive Post Exploitation Tool☆36Updated 5 years ago
- Automated install process for Phishing Frenzy☆24Updated 10 years ago
- Hand list of Powershell commands frequently used during penetration tests☆13Updated 6 years ago
- A tool for fuzzing for ports that allow outgoing connections☆18Updated 6 years ago
- MS17-010☆12Updated 7 years ago