PENBUD is penetration testing buddy which helps you in penetration testing by making various important tools interactive.
☆15Feb 4, 2021Updated 5 years ago
Alternatives and similar repositories for penbud
Users that are interested in penbud are comparing it to the libraries listed below
Sorting:
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Tutorial session from PyData London, Fri 6 May 2016☆11May 6, 2016Updated 9 years ago
- My eJPT exam cheatSheet☆13Nov 9, 2021Updated 4 years ago
- My experiences with Virtual Hacking Labs☆12Feb 7, 2020Updated 6 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A transformer that decodes swipes across a smartphone keyboard into words (gesture / swipe / glide typing) (enhanced yandex cup solution)☆15Feb 20, 2026Updated last month
- ☆16Mar 7, 2026Updated last week
- Shell script program to run Sandy Bridge GPU graphics in Mojave with hardware acceleration and hardware encoder/decoder (GVA)☆12Jun 2, 2019Updated 6 years ago
- HOCig- Automatic HOC Information Gathering Tool V 1.2☆10May 4, 2021Updated 4 years ago
- hardware tools for the BayTrail (BYT) platform and other platforms☆11Sep 10, 2023Updated 2 years ago
- Dump your Xbox game disks to usb☆13May 10, 2021Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆12Mar 2, 2019Updated 7 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 5 years ago
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- ☆10Aug 28, 2020Updated 5 years ago
- helper radare2 script to analyze UEFI firmware modules☆16Aug 30, 2018Updated 7 years ago
- CVE-2019-0232-Remote Code Execution on Apache Tomcat 7.0.42☆20Nov 21, 2019Updated 6 years ago
- Nitko web server scanner☆15Sep 25, 2019Updated 6 years ago
- A tool for parsing common ACPI tables☆15Aug 6, 2020Updated 5 years ago
- Scripts and configurations to get switching to work on the MBP 6,2☆22Mar 20, 2012Updated 14 years ago
- An Open-Source Work-In-Progress iOS 6 Jailbreak Using a Custom Ramdisk☆11May 13, 2022Updated 3 years ago
- ☆15Sep 19, 2019Updated 6 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- A collection of various scripts and automations to simplify Checkmarx SAST and IAST setup and use☆14Aug 30, 2018Updated 7 years ago
- ☆33Nov 14, 2023Updated 2 years ago
- Generic ASM Vulnerability Schema XSLT☆12May 30, 2018Updated 7 years ago
- Mishky's AD Range & The Escalation Path from Hell, Version 1.1☆11May 7, 2025Updated 10 months ago
- Code for the Presentation "Bot-in-the-middle" at Le Hack 2023!☆16Oct 9, 2023Updated 2 years ago
- Blue Team Powershell Script☆18Nov 22, 2021Updated 4 years ago
- The Secure Cloud Architecture (SCA) is a location & cloud agnostic flexible and repeatable conceptual deployment pattern that can adapt f…☆16Jul 13, 2020Updated 5 years ago
- CSV fuzzer/anonymizer☆10Feb 14, 2026Updated last month
- Python program to exploit stack-based buffer overflows.☆22Feb 24, 2021Updated 5 years ago
- ☆13Aug 11, 2020Updated 5 years ago
- A curated list of awesome projects, articles and the other materials powered by Radare2. Project was moved to https://github.com/radareor…☆16Oct 25, 2019Updated 6 years ago
- Microsoft Flight Simulator 2020 scenery for airfield EDEN - Bad Hersfeld☆14Oct 17, 2025Updated 5 months ago
- Creates a series of empty folders named after default keyspaces.☆12Nov 13, 2015Updated 10 years ago
- Melody is a transparent internet sensor built for threat intelligence. Supports custom tagging rules and vulnerable application simulatio…☆139Feb 14, 2025Updated last year
- bowing to the AI Overlords.☆31Dec 18, 2024Updated last year