ihebski / Pentest-chainsawView external linksLinks
Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product
☆46Jan 4, 2018Updated 8 years ago
Alternatives and similar repositories for Pentest-chainsaw
Users that are interested in Pentest-chainsaw are comparing it to the libraries listed below
Sorting:
- Reverse shell auto generator used for Hackthebox/OSCP/Pentest/LABExp☆40Dec 29, 2020Updated 5 years ago
- ☆16Mar 4, 2019Updated 6 years ago
- Template for asynchronously controlling meterpreter sessions☆13Jun 19, 2018Updated 7 years ago
- A simple script to check for insecurely exposed git repositories.☆12Mar 17, 2019Updated 6 years ago
- Collection of offensive tools targeting Microsoft Azure☆10Jun 9, 2022Updated 3 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- Some exploits for ZeroNights 0x03☆36Jul 3, 2015Updated 10 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Jun 25, 2020Updated 5 years ago
- Python3 Samples For Penetration Testing / Ethical Hacking (Offensive Side of The Python)☆15Feb 20, 2020Updated 5 years ago
- ☆19Jun 26, 2017Updated 8 years ago
- WAF Exploitation Framework☆13Aug 25, 2023Updated 2 years ago
- A curated list of awesome projects, libraries, and tools for MedSec.☆19Mar 22, 2019Updated 6 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆60Apr 20, 2021Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- free exploit framework written use python language version 3.3☆30Mar 31, 2018Updated 7 years ago
- visually see issues with supported cipher suites☆17Jun 18, 2024Updated last year
- A multi-target URL bruteforcer☆22Aug 6, 2018Updated 7 years ago
- The instructions provide a simpler way to install and run openvas docker container. The script automates the process of scanning a host p…☆16Feb 4, 2019Updated 7 years ago
- wordpress hash cracker .☆66Sep 7, 2021Updated 4 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆44Oct 6, 2020Updated 5 years ago
- An tool for search IOT MQTT vulnerable with shodan☆20Sep 15, 2017Updated 8 years ago
- Arduino Rubber Ducky Framework☆107Apr 29, 2019Updated 6 years ago
- IOS/MAC Denial-Of-Service [POC/EXPLOIT FOR MASSIVE ATTACK TO IOS/MAC IN NETWORK]☆34Nov 4, 2018Updated 7 years ago
- web information gathering / Grab links☆45Nov 1, 2019Updated 6 years ago
- CVE-2018-7600 Drupal RCE☆114Apr 18, 2018Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Oct 12, 2017Updated 8 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Apr 5, 2018Updated 7 years ago
- A tool to log method's parameters and return value.☆33Jan 18, 2015Updated 11 years ago
- ☆22Jul 6, 2018Updated 7 years ago
- Proof of Concept for CVE-2018-11776☆21Sep 12, 2018Updated 7 years ago
- A tool for exploiting Moxie Marlinspike's SSL "stripping" attack.☆22Updated this week
- Python implementation of the SlowLoris DoS attack.☆24Mar 19, 2017Updated 8 years ago
- Different utility scripts for pentesting and hacking.☆45Nov 10, 2017Updated 8 years ago
- Browser extension that complements the PhishDetect service☆24Feb 3, 2023Updated 3 years ago
- ☆12Jul 29, 2019Updated 6 years ago
- Projects for AWS ThreatHunting☆21Aug 20, 2021Updated 4 years ago
- Learning-Pentesting-With-Python☆18Sep 26, 2018Updated 7 years ago
- Some scripts and exploits☆147Jul 9, 2018Updated 7 years ago