gustavorhm / ZapPenTesterLinks
Command line tool that enables automated penetration testing in the Microsoft stack using OWASP ZAP
☆21Updated 10 years ago
Alternatives and similar repositories for ZapPenTester
Users that are interested in ZapPenTester are comparing it to the libraries listed below
Sorting:
- Metasploit Framework☆26Updated 2 weeks ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- Source Code Intelligence☆30Updated 8 years ago
- Working Rsh Client With Bind/Reverse Shell☆19Updated 10 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- rev-door is a small backdoor with only ONE line of PHP code, which takes command from POST data and execute it on server side. It is like…☆26Updated 9 years ago
- nmap nse script for web services screenshot☆16Updated 12 years ago
- An alternative for Metasploit psexec module, with automation capabilites to run across multiple hosts, while detecting the correct archit…☆14Updated 10 years ago
- Simple IP Information Tools for Reputation Data Analysis☆23Updated 6 years ago
- Ruby Oracle Security Scanner☆16Updated 13 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆66Updated last year
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆57Updated 7 years ago
- A Burp Suite extension that checks if a particular URL responds differently to various User-Agent headers☆16Updated 11 years ago
- Easy Window domain access☆51Updated 11 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Windows Offline Common Password Hash Checker☆29Updated 9 years ago
- Prometheus Firewall Analyzer☆47Updated 10 years ago
- a collection of useful scripts that for penetration testers☆35Updated 3 years ago
- Hardening Tool for *nixes☆50Updated 8 years ago
- Quick python script to automatically load NTLM hashes from Responder logs and fires up Hashcat to crack them☆80Updated 9 years ago
- Fingerprint a web app using local files as the fingerprint sources☆39Updated 8 years ago
- Runs Responder, uploads hashes for cracking, alerts when cracked☆37Updated 9 years ago
- Automates sslstrip arp spoofing MITM attack. FOR TESTING PURPOSES ONLY.☆37Updated 9 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- little scripts created during my time as a pentetration tester☆31Updated 13 years ago
- PoC for an adaptive parallelised DNS prober☆44Updated 8 years ago
- Checklist intended to be used as a baseline for assessing, designing, and testing the security of a MAM (Application Wrapping) solution☆20Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- Modular tool to test exfiltration techniques.☆37Updated 8 years ago
- Collection of information security policies.☆29Updated 8 years ago