jhwohlgemuth / zsh-pentestLinks
Aliases and functions for the lazy penetration tester
☆69Updated last year
Alternatives and similar repositories for zsh-pentest
Users that are interested in zsh-pentest are comparing it to the libraries listed below
Sorting:
- CLI & library to search for default credentials among thousands of Products / Vendors☆69Updated 4 years ago
- Interactive navi redteam cheats☆33Updated 5 months ago
- Notes from OSCP, CTF, security adventures, etc...☆64Updated last year
- Meticulously curated security notes with Emphasis on Application Security, DevSecOps, Cloud Computing, and Penetration Testing.☆137Updated last year
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- Target practice for ffuf☆69Updated 4 years ago
- Cheat-Sheet of tools for penetration testing☆54Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- ☆36Updated 2 years ago
- Generate common Reverse Shells for Pentesting☆43Updated 4 years ago
- A WLAN red team framework.☆155Updated last year
- A collection of my adventures through hackthebox.eu☆38Updated 4 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the targets with the s…☆17Updated 4 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆84Updated 5 months ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- Contained is all my reference material for my OSCP / Red Teaming. Designed to be a one stop shop for code, guides, command syntax, and h…☆95Updated last week
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- 📙 User documentation for Caido☆36Updated this week
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 3 months ago
- Red Team Templates For Obsidian.md☆32Updated 4 years ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆25Updated 5 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Updated 4 years ago
- Bash script which prepares Kali for a pentest by enabling session logging, installing tools, and making common configuration changes☆150Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 5 years ago
- ☆67Updated 2 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- A CLI tool to identify the hash type of a given hash.☆112Updated 3 years ago
- Search for Unix binaries that can be exploited to bypass system security restrictions.☆130Updated 5 months ago
- MayorSec DNS Enumeration Tool☆89Updated last year