Script to manage and create local pentesting training virtual lab
☆50Jun 7, 2020Updated 5 years ago
Alternatives and similar repositories for pentestlab
Users that are interested in pentestlab are comparing it to the libraries listed below
Sorting:
- Penetration Testing Lab☆28Jul 17, 2014Updated 11 years ago
- Local penetration testing lab using docker-compose.☆208Jun 17, 2025Updated 8 months ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Jun 11, 2023Updated 2 years ago
- Pentesting lab with a Kali Linux instance accessible via ssh & wireguard VPN and with vulnerable instances in a private subnet☆193Jul 4, 2024Updated last year
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Red Team Attack Lab for TTP testing & research☆595May 15, 2023Updated 2 years ago
- Vagrant VirtualBox environment for conducting an internal network penetration test☆959Jun 5, 2023Updated 2 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Mar 23, 2022Updated 3 years ago
- MasTKO is a security tool which detects DNS entries associated with AWS’s EC2 servers susceptible to takeover attack and attempts a takeo…☆11Jun 14, 2023Updated 2 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Some stuff for PHD2021☆14May 21, 2025Updated 9 months ago
- ☆13Jul 30, 2021Updated 4 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year
- This POC provides the possibilty to execute x86 shellcode in form of a .bin file based on x86 inline assembly☆20Apr 17, 2023Updated 2 years ago
- These are my personal notes for everything I learned regarding hacking APIs. Enjoy.☆20Mar 4, 2024Updated last year
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- ☆19Aug 26, 2020Updated 5 years ago
- ☆21Aug 26, 2021Updated 4 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- A pair of scripts to import session and local group information that has been collected from alternate data sources into BloodHound's Neo…☆20Aug 29, 2022Updated 3 years ago
- ☆24Sep 26, 2021Updated 4 years ago
- GNU/Linux version of the https://github.com/inquisb/icmpsh slave☆22Feb 11, 2020Updated 6 years ago
- Ansible Cobalt Strike (Docker)☆15Jan 8, 2022Updated 4 years ago
- Post-exploitation tool☆26Mar 7, 2021Updated 4 years ago
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆29Dec 7, 2025Updated 2 months ago
- Simple tool to use LsaManageSidNameMapping get LSA to add or remove SID to name mappings.☆26Oct 25, 2020Updated 5 years ago
- Jupyter Notebooks and material related to the BCI Ghidra Automations and Scripting video series (available on YouTube!)☆23Mar 6, 2023Updated 2 years ago
- PoC MSI payload based on ASEC/AhnLab's blog post☆24Sep 19, 2022Updated 3 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- ☆25Jun 2, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- Firebase Domain Front Code☆21May 4, 2021Updated 4 years ago
- An experiment to address digital intelligence archiving on offensive engagements.☆26Sep 30, 2020Updated 5 years ago
- eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)☆28Feb 6, 2024Updated 2 years ago
- Docker container that has all the CLI tooling for binary exploitation (thanks to @LiveOverflow)☆25Jul 6, 2023Updated 2 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Mar 29, 2021Updated 4 years ago
- Herramienta en PowerShell ideal para desplegar tu propio entorno AD vulnerable de forma automatizada.☆103Nov 28, 2023Updated 2 years ago
- Here are some common interview questions for an application security position you can review for your own interview, along with example a…☆31Apr 17, 2022Updated 3 years ago