A repository for large scripts from my book.
☆160Oct 1, 2021Updated 4 years ago
Alternatives and similar repositories for pythonpentest
Users that are interested in pythonpentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A simple little Python script that uses Impacket to check if SMBv1 is enabled on a remote host☆16Mar 9, 2017Updated 9 years ago
- A tool for security professionals to access and interact with remote Microsoft Windows based systems.☆432Nov 17, 2017Updated 8 years ago
- Scripts I use during pentest engagements.☆1,025Aug 18, 2020Updated 5 years ago
- Mimikatz HashClash☆12May 8, 2015Updated 10 years ago
- The educational Animus malware☆18Sep 25, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- A simple script that automates basic pentester reconaissance starting from nmap scans.☆10Dec 10, 2016Updated 9 years ago
- Simply runs through a wordlist of default/common group IDs and parses each hash to a separate file. Then it runs through the hashes with …☆10Feb 15, 2017Updated 9 years ago
- Various tools, exploits and other short code snippets☆12Dec 25, 2018Updated 7 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆79Dec 11, 2015Updated 10 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Office 365 MFA capture toolkit☆14Aug 3, 2017Updated 8 years ago
- ☆196Sep 27, 2018Updated 7 years ago
- Store Burp data and collaborate via git☆53Oct 31, 2019Updated 6 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Mar 16, 2016Updated 10 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Local UNIX PrivEsc Aggregation☆243Apr 9, 2016Updated 9 years ago
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- HTTP Header Analysis Vulnerability Tool☆115Dec 20, 2020Updated 5 years ago
- An Intentionally Vulnerable Router Firmware Distribution☆64Aug 12, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- A BurpSuite extension for lair☆28Oct 18, 2017Updated 8 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- A collection of post-exploitation tools for network red teaming.☆138Dec 7, 2018Updated 7 years ago
- ☆15Aug 28, 2014Updated 11 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ☆26Jan 18, 2026Updated 2 months ago
- Forked from joomscan-owasp at 26/02/2015 to add new functionality☆14Feb 26, 2015Updated 11 years ago
- Oracle Attacks Tool☆13Aug 9, 2016Updated 9 years ago
- some pocs for antivirus evasion☆129Aug 28, 2023Updated 2 years ago
- Windows Privesc Check☆20May 20, 2014Updated 11 years ago
- Metasploit Red Team Competition Modules☆13Apr 10, 2011Updated 14 years ago
- This is a bundle of python and bash penetration testing tools for recon and information gathering.☆81Dec 17, 2015Updated 10 years ago
- ☆30Sep 1, 2022Updated 3 years ago
- The Dirty Secrets They Didn't Teach You In Pentesting Class☆13Oct 5, 2011Updated 14 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Various snippets created during malware analysis☆464Oct 3, 2025Updated 5 months ago
- An automated script that download potential exploit for linux kernel from exploitdb, and compile them automatically☆497Sep 21, 2021Updated 4 years ago
- Automated Responder/secretsdump.py cracking☆187May 16, 2016Updated 9 years ago
- Specify targets and run sets of tools against them☆387Apr 23, 2019Updated 6 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- Fuzz and Detect "Use After Free" vulnerability in win32k.sys ( Heap based )☆138Nov 28, 2015Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago