leoanggal1 / P-SAKLinks
Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.
☆61Updated 4 years ago
Alternatives and similar repositories for P-SAK
Users that are interested in P-SAK are comparing it to the libraries listed below
Sorting:
- mikrot8over: Fast exploitation tool for Mikrotik RouterOS up to 6.38.4☆111Updated 4 years ago
- Create visualization from Shodan query☆75Updated 4 years ago
- A pre-DDoS security assessment tool☆120Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆76Updated 5 years ago
- Offensive Security recon tool☆92Updated 4 years ago
- Various wordlists for bruteforce☆35Updated 3 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆332Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- A WLAN red team framework.☆157Updated 11 months ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.☆66Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- EagleShell is a high-quality tool that aims to improve your pentest.☆77Updated 4 years ago
- Bundle of wordlists for brute-forcing subdomains (World + RUSSIA based).☆66Updated 7 years ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆152Updated 3 years ago
- Airodump-ng WiFi Scan Visualizer☆60Updated 7 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆16Updated 3 years ago
- Your go-to resource for all things OSINT☆180Updated last year
- A collection of scripts that help with different aspects of password cracking, such as wordlist generation, mask analysis, and positional…☆108Updated 5 years ago
- Vimana is a modular security framework for auditing Python APIs and Web applications. The plugin-based architecture enables security prof…☆64Updated 2 weeks ago
- ☆11Updated 5 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆81Updated 4 years ago
- Tool to find SMTP servers vulnerable to open relay☆82Updated 5 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- Set up your own BurpSuite☆37Updated 6 years ago
- WebStor efficiently enumerates all websites across your organization’s networks and those in your DNS records - including cloud-hosted se…☆157Updated last year