fabacab / pentest-linksLinks
THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.
☆11Updated 8 years ago
Alternatives and similar repositories for pentest-links
Users that are interested in pentest-links are comparing it to the libraries listed below
Sorting:
- Note:- Run this Script in root user.☆16Updated 7 years ago
- Password cracking utility☆53Updated 4 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆35Updated 9 years ago
- #Super-dracOS Dracos Linux is an open source operating system provides to penetration testing. Packed with a ton of pentest tools includi…☆33Updated 8 years ago
- SPIZZLE, The Onion Spider.☆13Updated 7 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Updated 11 years ago
- Package manager for hackers built by hackers☆36Updated 6 years ago
- Concurrently test bing results for shellshock vulnerability☆42Updated 10 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15Updated 10 years ago
- ARP spoof then session jack within your browser☆29Updated 11 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- Metasploit things, modules, plugins, exploits☆25Updated 10 years ago
- Vulnerability Scanner☆11Updated 10 years ago
- These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a grea…☆23Updated 7 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13Updated 7 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆56Updated 6 years ago
- Simple security surveillance script for linux distributions.☆59Updated 8 years ago
- A collection of wireless based bind and reverse connect shells for penetration testers to use in demonstrating persistence to a network v…☆39Updated 9 years ago
- Samsung TV Denial of Service (DoS) Attack☆37Updated 8 years ago
- hackpack to go with lazykali on menu application Kali Linux☆29Updated 10 years ago
- Proactive Computer Network Defense Strategy - OSINT Real Time Threat Stream - Social/DarkNet - Data Mining☆32Updated 12 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆13Updated 7 years ago
- Search google for shellshock vulnerable sites☆27Updated 10 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆45Updated 3 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 7 years ago
- This module captures SQL traffic using MITM techinques, and replace a given statement with a new one.☆12Updated 6 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago