highmeh / pentest_scripts
penetration testing scripts
☆136Updated 5 years ago
Alternatives and similar repositories for pentest_scripts:
Users that are interested in pentest_scripts are comparing it to the libraries listed below
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆145Updated 6 years ago
- Slides from various talks that I've given over the years☆117Updated last year
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆176Updated 5 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆156Updated 10 months ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- For all your network pentesting needs☆152Updated 8 months ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- Linux Local Privesc Helper and Agent☆165Updated 5 years ago
- A collection of scripts I've written to help red and blue teams with malware persistence techniques.☆128Updated 6 years ago
- Pypykatz server☆125Updated 6 years ago
- Discover target social media profiles☆81Updated 2 years ago
- locate and attack Lync/Skype for Business☆335Updated 5 months ago
- Common Findings Database☆100Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆75Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- ☆280Updated 4 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- A Metasploit auto auxiliary script☆103Updated 2 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆79Updated 9 months ago
- OSINT Threat Intel Interface - CLI for HoneyDB☆117Updated 6 years ago
- GreyNoise Query Language☆82Updated 5 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆393Updated 4 years ago
- Extract deleted secrets from git repos☆60Updated 7 years ago
- A penetration testing tool to enumerate and analyse Amazon S3 Buckets owned by a domain.☆111Updated 5 years ago