Script to manage and create local pentesting training virtual lab
☆50Jun 7, 2020Updated 5 years ago
Alternatives and similar repositories for pentestlab
Users that are interested in pentestlab are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Penetration Testing Lab☆28Jul 17, 2014Updated 11 years ago
- Local penetration testing lab using docker-compose.☆209Jun 17, 2025Updated 9 months ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆192Jul 4, 2024Updated last year
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Red Team Attack Lab for TTP testing & research☆597May 15, 2023Updated 2 years ago
- Vagrant VirtualBox environment for conducting an internal network penetration test☆965Jun 5, 2023Updated 2 years ago
- (EDUCATIONAL PURPOSES ONLY) bypass discord blacklisted words.☆10Apr 27, 2023Updated 2 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- tryhackme writeups☆13Jun 28, 2020Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆44Mar 23, 2022Updated 4 years ago
- [QRS'22] TokenAuditor: Detecting Manipulation Risk in Token Smart Contract by Fuzzing☆16Aug 24, 2023Updated 2 years ago
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Dec 30, 2023Updated 2 years ago
- ☆13Jul 30, 2021Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆30Dec 7, 2025Updated 3 months ago
- These are my personal notes for everything I learned regarding hacking APIs. Enjoy.☆21Mar 4, 2024Updated 2 years ago
- Pentesting resources☆23May 3, 2019Updated 6 years ago
- Simple Tricks I use While Playing King Of The Hill☆18Apr 10, 2020Updated 5 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆23Mar 6, 2023Updated 3 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- Python Penetration Testing Tools☆17Jul 19, 2025Updated 8 months ago
- Proof of Concept for CVE-2023-23397 in Python☆25Mar 21, 2023Updated 3 years ago
- ☆20May 18, 2022Updated 3 years ago
- 📚A curated list of product security resources.☆23Jun 11, 2025Updated 9 months ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- A fast wordlist to nthash converter☆21Nov 22, 2021Updated 4 years ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- ASYRV es una aplicación escrita en PHP/MySQL, con Servicios Web mal desarrollados(SOAP/REST/XML), esperando ayudar a los entusiastas de l…☆23Oct 13, 2018Updated 7 years ago
- ☆101Oct 18, 2023Updated 2 years ago
- OWASP Foundation web repository☆17Oct 11, 2025Updated 5 months ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆136Apr 28, 2020Updated 5 years ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- X-Platform bind shell in TypeScript!☆29Jul 11, 2025Updated 8 months ago
- ☆14Dec 3, 2020Updated 5 years ago