๐ฅ Pentest Cheat Sheet
โ36Aug 10, 2021Updated 4 years ago
Alternatives and similar repositories for DeathNote
Users that are interested in DeathNote are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.โ27Dec 29, 2021Updated 4 years ago
- A small, lightweight, and portable tool for injecting code or text to any other file or replacing a keyword.โ15Apr 13, 2023Updated 2 years ago
- Fast DNS history enumeration tool for network and OSINT investigationsโ17Dec 6, 2020Updated 5 years ago
- An Advanced PHP Cryptography Frameworkโ16Feb 12, 2024Updated 2 years ago
- Human Oriented SHellโ27Apr 1, 2024Updated last year
- Proof of concept about the privilege escalation flaw identified in Google's Osconfigโ10Sep 20, 2020Updated 5 years ago
- psgen is a powershell payload generator tool for hacking. It can be used to generate, minify, and encode the powershell payload (e.g., reโฆโ18Jun 30, 2020Updated 5 years ago
- Automated NoSQL database enumeration and web application exploitation tool.โ25May 6, 2019Updated 6 years ago
- โ17Jan 2, 2020Updated 6 years ago
- ๐ The Offensive Pythonโ20Jun 4, 2021Updated 4 years ago
- Vulnerability Knowledge Base comparison toolโ13Feb 9, 2022Updated 4 years ago
- Post-Auth RCE & Persistence on UOKOO Security Camerasโ13Nov 17, 2020Updated 5 years ago
- ๆปๅปJava Webๅบ็จ-[Java Webๅฎๅ จ]โ15Dec 9, 2020Updated 5 years ago
- Flexible Penetrate Testing Auxiliary Suiteโ73Jun 19, 2023Updated 2 years ago
- PEDA - Python Exploit Development Assistance for GDBโ23Aug 6, 2025Updated 7 months ago
- Tool to generate csrf payloads based on vulnerable requestsโ64Oct 9, 2020Updated 5 years ago
- Wi-Fi Exploit Toolโ50May 23, 2020Updated 5 years ago
- Botnet targeting Windows machines ๐โ46Feb 25, 2026Updated 3 weeks ago
- Yet another OSINT automator.โ18Nov 15, 2020Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect thaโฆโ16Mar 10, 2026Updated last week
- wifi attacks suiteโ59Sep 24, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-levelโ13May 12, 2021Updated 4 years ago
- โ19Dec 15, 2018Updated 7 years ago
- Web application recon for bug bountyโ21Apr 19, 2020Updated 5 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)โ42Dec 2, 2020Updated 5 years ago
- ้ๆBeaconโ15Aug 25, 2024Updated last year
- A Payload Injector for bugbounties written in goโ70Jul 18, 2020Updated 5 years ago
- Next generation cyber security research and testing software.โ16Mar 18, 2021Updated 5 years ago
- Nuubi Tools (Information-ghatering|Scanner|Recon.)โ87Jun 27, 2020Updated 5 years ago
- FireVu is an Intentionally vulnerable Android application developed for Android open source security.โ11Mar 13, 2024Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzingโ23Nov 3, 2020Updated 5 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitationโ19Jul 4, 2020Updated 5 years ago
- Docker image for hackingโ21Feb 10, 2025Updated last year
- Basic c2-matrix analysis enviroment using Suricata + Wazuh + Elastic stackโ12Apr 18, 2020Updated 5 years ago
- Ashok is a Osint Reconnaissance Tool , a.k.a swiss knife for Reconnaissance , A tool for every beginner/pentester in their penetration tโฆโ26May 8, 2020Updated 5 years ago
- SubDomain Finderโ13Nov 9, 2021Updated 4 years ago
- Collection of Jupyter notebooksโ14Mar 11, 2021Updated 5 years ago
- Custom security distro for remote penetration testingโ56Mar 26, 2021Updated 4 years ago
- R3C0Nizer is the first ever CLI based menu-driven web application B-Tier recon framework.โ152Apr 2, 2021Updated 4 years ago