Manage all logistical information for a pentest including clients, contacts, employees, findings, projects, scoping, and vulnerabilities.
☆43Apr 18, 2024Updated 2 years ago
Alternatives and similar repositories for assessment-manager
Users that are interested in assessment-manager are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A web app scanner☆24Jan 23, 2014Updated 12 years ago
- NMAP NSE that enumerates VNC authentication types☆14Dec 21, 2010Updated 15 years ago
- Script to install the latest stable ntopng from the official ntop repo, onto a Security Onion 14.04 or 16.04 sensor☆10Jan 27, 2021Updated 5 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- huawei mac2wepkey scanner☆19Jun 6, 2013Updated 12 years ago
- Test for leaking DNS queries (i.e. if you're on a VPN)☆21May 19, 2014Updated 11 years ago
- A very tiny PHP shell☆27Jan 26, 2012Updated 14 years ago
- My custom kali live build configuration☆10Jan 29, 2021Updated 5 years ago
- Basic script for monitoring new posts on Pastebin for keywords☆12Nov 27, 2016Updated 9 years ago
- Exporting MISP event attributes to yara rules usable with Thor apt scanner☆25Mar 27, 2017Updated 9 years ago
- Decryption utility for PGP Whole Disk Encryption☆20Aug 27, 2021Updated 4 years ago
- CVE Vulnerability scanner of your software bill of materials (SBOM). ASCII text input.☆17Oct 26, 2020Updated 5 years ago
- Presentation Slides and Video links☆32Nov 8, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Your last stop for password list generation needs!☆27Mar 4, 2015Updated 11 years ago
- ECOin is a P2P crypto-currency with the goal of providing a long-term energy-efficient digital economy strategy.☆13Feb 28, 2026Updated last month
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- 💻 Elevate, UAC bypass, privilege escalation, dll hijack techniques☆11Nov 23, 2018Updated 7 years ago
- Slide deck for DefCon Beijing☆39May 15, 2018Updated 7 years ago
- Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.☆16Jan 15, 2026Updated 3 months ago
- Python library for managing malware feeds and blacklists published online by third parties.☆10Nov 13, 2015Updated 10 years ago
- ☆22Mar 1, 2022Updated 4 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- External NSE script library (Collection of unofficial scripts) - Feel free to submit your NSE scripts!☆33Jan 5, 2022Updated 4 years ago
- Back, back, back in time... before there were fancy schmanzy web GUIs... along came SATAN.☆13Jul 10, 2015Updated 10 years ago
- A PowerShell Logging Module that uses Classes to log to the console, log file, or the event viewer☆13Sep 13, 2018Updated 7 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆25Apr 19, 2022Updated 4 years ago
- nmap nse script for web services screenshot☆16Jul 22, 2013Updated 12 years ago
- Misc resources for my daily pentesting...☆19Mar 26, 2025Updated last year
- Pupy is an opensource, multi-platform (Windows, Linux, OSX, Android), multi function RAT (Remote Administration Tool) mainly written in p…☆12Jan 10, 2020Updated 6 years ago
- Modifed PowerSploit/PowerView to search files and match RegEx for Sensitive info (PII, PCI, Passwords, Usernames, SNMP Strings, etc.)☆14Aug 1, 2018Updated 7 years ago
- PoC of BitcoinCore Denial-Of-Service and DoubleSpending☆10Nov 12, 2018Updated 7 years ago
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- Personal repository with handy cheatsheets.☆16Oct 23, 2016Updated 9 years ago
- Burp plugin that clusters responses to show an overview of received responses☆15Jun 7, 2019Updated 6 years ago
- Academic project implementing basic first-hop LAN attacks such as DHCP starvation, ARP spoofing, DNS poisoning and more.☆18May 14, 2020Updated 5 years ago
- An interactive TUI tool to create Brute Ratel C4 profiles based on BURP browsing data.☆32May 23, 2025Updated 10 months ago
- Detect data containing Personally Identifiable Information (PII) in R☆15Jul 1, 2017Updated 8 years ago
- Historical Observations of Actionable Reputation Data☆13Jun 26, 2018Updated 7 years ago
- Ultimate Internet of Things/Industrial Control Systems reconnaissance tool.☆11Feb 11, 2022Updated 4 years ago