etc5had0w / penbud
PENBUD is penetration testing buddy which helps you in penetration testing by making various important tools interactive.
☆15Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for penbud
- ☆31Updated last year
- You and the AppleLabs' Incident Response Team have been notified of a potential breach to a Human Resources' workstation. According to th…☆75Updated 2 years ago
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆47Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆137Updated 3 years ago
- Automate writeup for vulnerable machines.☆41Updated last year
- Initial scanning and enumeration tool for basic penetration testing challenges such as Hack the Box☆19Updated 4 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Updated 4 years ago
- OSCP Notes written from PWK Course☆45Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆29Updated last year
- If you've ever picked up a book on Wireshark or network monitoring, they almost all cover about the same information. They'll show you, "…☆19Updated 5 years ago
- A compilation of customizations for Debian-based Linux distrubutions (mostly Pop!_OS and Kali Linux) and (finally) a mostly automated scr…☆17Updated last month
- Wireless Pentesting Device☆19Updated 4 years ago
- A python based semi-automatic buffer overflow exploit script☆16Updated 4 years ago
- A script that I made to get the essentials I use for various reasons on Kali Linux.☆53Updated last year
- A curated list of Awesome Threat Intelligence resources☆46Updated 6 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆99Updated 3 years ago
- A python script to turn Ubuntu Desktop in a one stop security platform. The InfoSec Fortress installs the packages,tools, and resources t…☆50Updated 2 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 4 years ago
- TunnelPy simply exposes any service, running internally in a network/host, to the outside, by creating a tunnel between a client on the o…☆21Updated 3 years ago
- A custom script I created because I got tired of installing my tools manually!☆15Updated last year
- scripts to setup environments for red/blue teams.☆16Updated 11 months ago
- Reconnaissance and Enumeration automation script☆52Updated 3 years ago
- Quick and dirty scripts for pentesting.☆40Updated 4 years ago
- A dump of all the scripts that I make☆19Updated 3 years ago
- This software is for study to Computer Hacker Forensic Investigator certification☆25Updated 4 years ago
- A collection of data exfiltration scripts for Red Team assessments.☆95Updated 4 years ago
- ☆54Updated 4 years ago
- Image Payload Creating/Injecting tools☆12Updated 3 years ago