jmortega / python-pentesting
python-pentesting-tool
☆180Updated last year
Related projects ⓘ
Alternatives and complementary repositories for python-pentesting
- Python for Offensive PenTest, published by Packt☆135Updated last year
- Curated list of public penetration test reports released by several consulting firms and academic security groups☆40Updated 7 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆173Updated last year
- A curated list of network penetration testing tools.☆58Updated last week
- Web Security Checklist (Bug Bounty & Pentesting)☆162Updated last year
- A collection of templates for bug bounty reporting☆379Updated 3 years ago
- Offensive Security / Pentesting Cheat Sheets☆96Updated 6 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆212Updated 4 years ago
- API Pentesting notes.☆96Updated last week
- A modular recon tool for pentesting☆228Updated 6 years ago
- Official module repository for the Recon-ng Framework.☆223Updated 4 months ago
- Master script for web reconnaissance☆317Updated 5 months ago
- Pentesting Cheatsheets and Guides☆124Updated 7 years ago
- A collection of python scripts that are used for network analysis and testing.☆57Updated 5 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆49Updated 9 years ago
- Automate dorking while doing bug bounty or other stuffs.☆210Updated 2 years ago
- The Penetration Testing Execution Standard (PTES) Automation Framework☆47Updated 8 years ago
- A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrato…☆65Updated 2 years ago
- A collection of useful links for Pentesters☆150Updated 3 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆244Updated 2 years ago
- SecLists is the security tester's companion. It is a collection of multiple types of lists used during security assessments. List types i…☆92Updated this week
- All my Hacking|Pentesting Notes☆288Updated 8 years ago
- Note: Going through a full re-write of the tooling so the current versions in the repo do not work!☆399Updated 4 years ago
- The tools I have programmed to help me with bugbounty's☆114Updated 5 years ago
- Does some google dorks against a domain☆159Updated 4 years ago
- Automatic & lightning fast wordpress vulnerability scanner☆44Updated 2 years ago
- ☆42Updated 8 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆162Updated 6 years ago
- ☆57Updated last year
- How to prepare for OSCP complete guide☆128Updated 5 years ago