kurogai / pentest-checklistLinks
An accurated list of things to test while pentesting
☆11Updated 4 years ago
Alternatives and similar repositories for pentest-checklist
Users that are interested in pentest-checklist are comparing it to the libraries listed below
Sorting:
- ☆19Updated 4 years ago
- Custom pentesting tools☆25Updated 5 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆59Updated 4 years ago
- Active Directory information dumper via LDAP☆13Updated 5 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Sp00fer blog post -☆25Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆28Updated 3 years ago
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆23Updated last year
- buffer overflow examples☆22Updated 7 years ago
- ☆29Updated 2 years ago
- Modular framework to exploit UPS devices☆66Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆38Updated last month
- Red Team Projects with chat.openai.com.☆17Updated 2 years ago
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- Wireless Pentesting Device☆24Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆25Updated 5 years ago
- ☆33Updated 10 months ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Tool to crawl, visualize and interact with SQL server links in a d3 graph to help in your red/blue/purple/.../risk assessments pentest …☆19Updated 5 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆17Updated 2 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Automated Recon Framework☆24Updated 5 years ago
- A framework for easy payloads development and deployment, collection of customizable XSS payloads☆26Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆10Updated 2 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago