Automate Pentest Tool
☆35Sep 13, 2017Updated 8 years ago
Alternatives and similar repositories for Yuki-Chan-The-Auto-Pentest-1
Users that are interested in Yuki-Chan-The-Auto-Pentest-1 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Automated Scanning, Pentesting , Exploiting and Reporting☆21Nov 21, 2021Updated 4 years ago
- All in One Recon Tool for Bug Bounty☆16Dec 30, 2022Updated 3 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- ☆35Mar 18, 2026Updated last week
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- ☆13Mar 23, 2023Updated 3 years ago
- ASLR Evasion, Egghunters, SEH Overwrites☆29Mar 6, 2021Updated 5 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- ☆14Apr 6, 2025Updated 11 months ago
- Automated tool for domains & Subdomains Gathering☆14Feb 26, 2026Updated last month
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- AgentTesla botnet C&C RCE exploit.☆16Aug 13, 2019Updated 6 years ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- SMF2WPBridge is a simple one way bridge from Simple Machine Forum to Wordpress.☆12Apr 10, 2020Updated 5 years ago
- psychoPATH - hunting file uploads & LFI in the dark. This tool is a customisable payload generator designed for blindly detecting LFI & w…☆19Jun 28, 2018Updated 7 years ago
- Um projeto dedicado ao compartilhamento de artigos, links e documentos sobre Windows NT Internals, reunindo conhecimento avançado sobre o…☆25May 16, 2025Updated 10 months ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- A powerful tool to scan CRLF vulnerability written in Python☆15Oct 31, 2023Updated 2 years ago
- NetHunter kernel for Ginkgo/Willow A11/A12 based on ArrowOS source☆10Dec 25, 2021Updated 4 years ago
- Reports of cyber threat intelligence☆13Feb 15, 2023Updated 3 years ago
- A malicious .cab creation tool for CVE-2021-40444☆13Sep 12, 2021Updated 4 years ago
- 👨🏼💻 Brute force wifi passwords with AppleScript.☆14Jan 7, 2020Updated 6 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- A collection of tools for every PENTEST engagement☆12Oct 21, 2019Updated 6 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- Standardised setup for researching WordPress plugin- and theme vulnerabilities.☆31Mar 17, 2026Updated last week
- OSCP☆37Nov 24, 2021Updated 4 years ago
- AISecLists - Your AI Red Teaming Arsenal. Discover a curated collection of prompt lists for diverse AI security assessments, including LL…☆13Jan 18, 2025Updated last year
- A curated list of FOSS software appliances for building a SOC☆18Jan 11, 2021Updated 5 years ago
- Deathstar is an Empire plugin that automates gaining Domain and/or Enterprise Admin rights in Active Directory environments using common …☆20Mar 24, 2025Updated last year
- The shards of code that will soon become the next GooDork version☆17Mar 6, 2013Updated 13 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- A sCrypt based miner for litecoins written in Java☆26Nov 18, 2011Updated 14 years ago
- Commands to perform various activities related to penetration testing and red teaming☆21Jan 17, 2020Updated 6 years ago
- Linux Shared Library to Shellcode Loader☆90Feb 15, 2026Updated last month
- An Advanced tool to scan hundreds of IP's in Seconds for CVE's, Open Ports And Web Technologies.☆22Apr 30, 2022Updated 3 years ago
- ☆12Jan 3, 2018Updated 8 years ago
- ☆16Oct 12, 2017Updated 8 years ago
- ☆24Apr 23, 2024Updated last year