Aliases and functions for the lazy penetration tester
☆69Jan 28, 2024Updated 2 years ago
Alternatives and similar repositories for zsh-pentest
Users that are interested in zsh-pentest are comparing it to the libraries listed below
Sorting:
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆213Jun 23, 2020Updated 5 years ago
- Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting☆17Jan 23, 2025Updated last year
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆12Mar 4, 2021Updated 5 years ago
- Random code snippets☆12Oct 27, 2023Updated 2 years ago
- Grafana Arbitrary File Reading Vulnerability☆27Dec 7, 2021Updated 4 years ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆47Jan 30, 2024Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆23May 8, 2022Updated 3 years ago
- This is a repository to house convenient things for the 2019 PCDC competition.☆13Apr 13, 2019Updated 6 years ago
- Convert an IP into Alternative / Obfuscated versions of itself☆14Aug 13, 2022Updated 3 years ago
- Pentest-Command☆20Nov 10, 2021Updated 4 years ago
- ☆19Mar 4, 2023Updated 3 years ago
- vRealize RCE + Privesc (CVE-2021-21975, CVE-2021-21983, CVE-0DAY-?????)☆39Apr 7, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16May 6, 2017Updated 8 years ago
- Serving files with conditions, serverside keying and more.☆18May 26, 2022Updated 3 years ago
- Play Hack The Box directly on your system.☆57Feb 1, 2026Updated last month
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago
- ☆11May 28, 2022Updated 3 years ago
- Fake SMB and SAMR data☆11Oct 27, 2019Updated 6 years ago
- ☆15Aug 21, 2021Updated 4 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- Discovery Header Bug Bounty to DoD☆49Aug 20, 2021Updated 4 years ago
- PolicyKit CVE-2021-3560 Exploit (Authentication Agent)☆117May 2, 2022Updated 3 years ago
- Silent Cleanup UAC Bypass POC☆11Dec 15, 2019Updated 6 years ago
- proxyshell payload generate☆75Aug 14, 2021Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆85Nov 7, 2020Updated 5 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- Python script to execute commands via Erlang/OTP Distribution Protocol☆15Feb 6, 2024Updated 2 years ago
- 就是一个练习RMI反序列化的最简单环境☆30Jan 8, 2022Updated 4 years ago
- ☆11Jun 9, 2020Updated 5 years ago
- .NET 4.0 Fast Directory / File Lister☆27Sep 25, 2020Updated 5 years ago
- Multi-threaded port scanner written in C++☆14Dec 17, 2019Updated 6 years ago
- A testing Red Team Infrastructure created with Docker☆32Apr 5, 2022Updated 3 years ago
- Generate malicious files using recently published homoglyphic-attack (CVE-2021-42694)☆18May 23, 2023Updated 2 years ago
- Post-exploitation script developed using impacket☆21Mar 15, 2022Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Aug 27, 2023Updated 2 years ago
- PoC code from blog☆16Mar 10, 2020Updated 6 years ago