jonaslejon / Pentest-Tools
☆10Updated 3 years ago
Alternatives and similar repositories for Pentest-Tools:
Users that are interested in Pentest-Tools are comparing it to the libraries listed below
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- A ZAPROXY Add-on that allows testing of web application vulnerabilities by recording complex multi-step sequences. You can test applica…☆22Updated last month
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 2 years ago
- An automated e-mail OSINT tool☆20Updated 3 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated last year
- Automated HTTP Request Repeating With Burp Suite☆37Updated 2 years ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- A little cheatsheet for NetExec☆22Updated 11 months ago
- ☆25Updated last year
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- ☆24Updated 6 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆42Updated 2 years ago
- ☆37Updated last year
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆49Updated 11 months ago
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 11 months ago
- ☆27Updated 2 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 2 months ago
- Windows Reverse TCP Shell for Hacking and Pentesting☆24Updated 8 months ago
- A Red Teaming tool focused on profiling the target.☆26Updated 10 months ago
- ☆44Updated last year
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 8 months ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago