leoanggal1 / P-SAK
Pentester Swiss Army Knife is a Docker Image with a suite of the most used tools for Hacking and Pentesting.
☆59Updated 4 years ago
Alternatives and similar repositories for P-SAK:
Users that are interested in P-SAK are comparing it to the libraries listed below
- A pre-DDoS security assessment tool☆120Updated 3 years ago
- Enumerate a target Based off of Nmap Results☆78Updated last year
- ☆47Updated 3 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Updated 4 years ago
- An epic web shell☆84Updated last month
- Various wordlists for bruteforce☆32Updated 3 years ago
- Create visualization from Shodan query☆72Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆13Updated 5 years ago
- Tool to generate csrf payloads based on vulnerable requests☆62Updated 4 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago
- ☆11Updated 4 years ago
- Security checks for your researches☆33Updated 4 years ago
- Python tool to find specific files in exposed AWS S3 servers.☆20Updated 4 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆58Updated 7 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated 8 months ago
- #crypto #cipher #encode #decode #hash☆51Updated 3 years ago
- Sample list of penetration test reports☆17Updated 8 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆65Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- This script was developed to track progress for reporting (capture screenshot, commands and outputs) during pentest engagement and OSCP.☆72Updated 4 years ago
- An Encrypted File transfer via AES-256-CBC☆48Updated 3 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- Automated Tools Pentest☆7Updated last year
- Unique wordlist generator of unique wordlists.☆43Updated last year
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆79Updated 3 years ago
- Login hunter of default credentials for administrative web interfaces leveraging NNdefaccts dataset.☆325Updated 4 years ago
- Offensive Security recon tool☆92Updated 3 years ago
- A Burp Suite Extender that recognize CAPTCHA and use for intruder payload☆17Updated 7 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆141Updated last year
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆70Updated 3 years ago