Fast and easy script to manage pentesting training apps
☆380Feb 17, 2024Updated 2 years ago
Alternatives and similar repositories for pentestlab
Users that are interested in pentestlab are comparing it to the libraries listed below
Sorting:
- ☆36Jul 11, 2018Updated 7 years ago
- Converts JBoss/Wildfly management users properties file to hashcat format compatible with mode 20☆12Apr 26, 2020Updated 5 years ago
- ☆11Jan 24, 2023Updated 3 years ago
- Automatic Service Enumeration Script☆229Oct 12, 2022Updated 3 years ago
- bash script for automating subdomain enumeration process either passive or active☆29Feb 24, 2026Updated last week
- Pythonize Intruder Payload☆13Dec 15, 2020Updated 5 years ago
- Local penetration testing lab using docker-compose.☆208Jun 17, 2025Updated 8 months ago
- Red Team C2 Infrastructure built in AWS using Ansible!☆232Oct 4, 2020Updated 5 years ago
- Active Directory Lab for Penetration Testing☆54Jul 16, 2025Updated 7 months ago
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,803Sep 17, 2024Updated last year
- A simple web app with a XXE vulnerability.☆231Nov 10, 2021Updated 4 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- Pentesting/Bugbounty Dockerfiles.☆176May 29, 2021Updated 4 years ago
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- Filter URLs to save your time.☆60Jul 29, 2022Updated 3 years ago
- Create a vulnerable active directory that's allowing you to test most of the active directory attacks in a local lab☆2,257Apr 12, 2024Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,372Feb 17, 2026Updated 2 weeks ago
- Burp Suite extension to discover assets from HTTP response.☆232Jan 22, 2025Updated last year
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆77Nov 10, 2019Updated 6 years ago
- A curated list of awesome BloodhoundAD resources☆237Oct 13, 2022Updated 3 years ago
- Dr. Watson is a simple Burp Suite extension that helps find assets, keys, subdomains, IP addresses, and other useful information! It's yo…☆216Oct 31, 2019Updated 6 years ago
- Damn Vulnerable Bank is designed to be an intentionally vulnerable android application. This provides an interface to assess your android…☆735Dec 13, 2023Updated 2 years ago
- Credentials gathering tool automating remote procdump and parse of lsass process.☆782Jun 20, 2020Updated 5 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆708Sep 4, 2024Updated last year
- A tool which scrapes public github repositories for common naming conventions in variables, folders and files☆296Jun 3, 2024Updated last year
- Benchmarking repo for secrets scanning☆243Aug 18, 2024Updated last year
- ☆19Aug 26, 2020Updated 5 years ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,542Feb 11, 2023Updated 3 years ago
- Various Payload wordlists☆240Apr 26, 2025Updated 10 months ago
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- ☆57May 13, 2020Updated 5 years ago
- ☆134Feb 5, 2021Updated 5 years ago
- Damn Vulnerable WordPress☆198Dec 23, 2023Updated 2 years ago
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- My Recon Automation☆194May 28, 2021Updated 4 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,350Sep 30, 2024Updated last year
- ☆21May 1, 2021Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago