highmeh / pentest_scriptsLinks
penetration testing scripts
☆136Updated 5 years ago
Alternatives and similar repositories for pentest_scripts
Users that are interested in pentest_scripts are comparing it to the libraries listed below
Sorting:
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆96Updated 8 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆239Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆154Updated 10 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆158Updated last year
- ⚠️WARNING: This project now become part of https://github.com/j3ssie/Metabigor project☆178Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Python script to scan Git repos for interesting strings☆160Updated 5 years ago
- Slides from various talks that I've given over the years☆118Updated last year
- ☆61Updated 7 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- ☆105Updated 5 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- A Metasploit auto auxiliary script☆104Updated 2 years ago
- Discover target social media profiles☆81Updated 2 years ago
- A testing framework for mail security and filtering solutions.☆244Updated 2 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆76Updated 6 years ago
- Pentesting suite for Maltego based on data in a Metasploit database☆150Updated 7 years ago
- A traffic analyzer to evade Empire's communication from Anomaly-Based IDS☆109Updated 6 years ago
- Common Findings Database☆101Updated 6 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- PoC for an adaptive parallelised DNS prober☆108Updated 2 years ago
- Transform NMap Scans to an D3.js HTML Table☆59Updated 7 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆61Updated 7 years ago
- AWS Extender CLI is a command-line script to test S3 buckets as well as Google Storage buckets and Azure Storage containers for common mi…☆83Updated 5 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- This tool is based on regex with effective standards for detecting phishing sites in real time using certstream and can also detect puny…☆79Updated 6 years ago