killswitch-GUI / PenTesting-Scripts
A ton of helpful tools
☆336Updated 3 years ago
Alternatives and similar repositories for PenTesting-Scripts:
Users that are interested in PenTesting-Scripts are comparing it to the libraries listed below
- Scripts that are useful for me on pen tests☆527Updated 2 years ago
- Remote Recon and Collection☆448Updated 7 years ago
- Collection of social engineering payloads☆295Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆284Updated 5 years ago
- Windows Pentest Scripts☆230Updated 7 years ago
- Fileless web browser information extraction☆218Updated 6 years ago
- locate and attack Lync/Skype for Business☆335Updated 4 months ago
- Phishing Template Generation Made Easy☆165Updated 7 years ago
- Enumerate usernames on a domain where you have no creds by using SMB Relay with low priv.☆393Updated 4 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆305Updated 4 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆365Updated 6 months ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- Github for the scripts utilised during Penetration test☆237Updated 7 years ago
- A multithreaded tool designed to identify if credentials are valid, invalid, or local admin valid credentials within a network at-scale v…☆446Updated 2 years ago
- For all your network pentesting needs☆152Updated 7 months ago
- This repo contains my custom scripts for Penetration Testing and Red Team Assessments. I will keep on updating this repo as and when I ge…☆350Updated 6 years ago
- Check for valid credentials across a network over SMB☆258Updated last year
- Rapid Attack Infrastructure (RAI)☆304Updated 2 months ago
- DBC2 (DropboxC2) is a modular post-exploitation tool, composed of an agent running on the victim's machine, a controler, running on any m…☆294Updated 7 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Portia aims to automate a number of techniques commonly performed on internal network penetration tests after a low privileged account ha…☆502Updated 4 years ago
- Lazykatz is an automation developed to extract credentials from remote targets protected with AV and/or application whitelisting software…☆198Updated 7 years ago
- Various Cheat Sheets☆180Updated 3 years ago
- ObfuscatedEmpire is a fork of Empire with Invoke-Obfuscation integrated directly into it's functionality.☆228Updated 7 years ago
- Feed the tool a .nessus file and it will automatically get you MSF shell☆235Updated 2 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆207Updated 7 years ago
- Pivoter is a proxy tool for pentesters to have easier lateral movement.☆140Updated 9 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆522Updated 7 years ago