leoanggal1 / P-SAKLinks
Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.
☆60Updated 5 years ago
Alternatives and similar repositories for P-SAK
Users that are interested in P-SAK are comparing it to the libraries listed below
Sorting:
- A pre-DDoS security assessment tool☆119Updated 4 years ago
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆112Updated 5 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆331Updated 5 years ago
- A WLAN red team framework.☆154Updated last year
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆67Updated 4 years ago
- Offensive Security recon tool☆91Updated 4 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆37Updated 5 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆79Updated 3 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆74Updated 5 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆21Updated 5 years ago
- Free Advance encryptor for Anon Cloud☆16Updated 2 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆150Updated 4 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆64Updated 7 years ago
- A proof of concept crypto virus to spread user awareness about attacks and implications of ransomwares. Phirautee is written purely using…☆119Updated 5 years ago
- Various wordlists for bruteforce☆35Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Set up your own BurpSuite☆37Updated 7 years ago
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆109Updated 6 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆66Updated 7 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- Unicode encoding attacks with machine learning☆97Updated 4 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Airodump-ng WiFi Scan Visualizer☆61Updated 7 years ago
- Automate Metasploit scanning and exploitation☆116Updated 5 months ago