a collection of best pentest resources
☆34Feb 4, 2019Updated 7 years ago
Alternatives and similar repositories for pentest-tools
Users that are interested in pentest-tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- HTTP Headers Security Cheat Sheet☆12Sep 25, 2021Updated 4 years ago
- Webmin 1.910 - Remote Code Execution Using Python Script☆11Feb 6, 2024Updated 2 years ago
- A scalable robust calculator application for the Flipper Zero☆13Jan 16, 2023Updated 3 years ago
- PoC for CVE-2022-23940☆12May 7, 2025Updated last year
- Educational Satellite for Learning CubeSat☆24Jul 21, 2023Updated 2 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- This is a exploit of CVE-2022-46169 to cacti 1.2.22. This exploit allows through an RCE to obtain a reverse shell on your computer.☆41Sep 11, 2023Updated 2 years ago
- CVE-2020-7384☆10Feb 7, 2021Updated 5 years ago
- Collections of code obfuscation libaries for different languages ( in progress )☆15Mar 18, 2023Updated 3 years ago
- PoC for CVE-2021-45897☆18Jan 31, 2022Updated 4 years ago
- ☆14Apr 27, 2025Updated last year
- ☆10Aug 17, 2021Updated 4 years ago
- tl;tr; jhaddix bhmv5☆10Jul 2, 2020Updated 5 years ago
- Apache forward request CVE☆16Apr 3, 2022Updated 4 years ago
- A wake-up light, built with Elixir, Nerves, running on a Raspberry Pi Zero☆15May 1, 2018Updated 8 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Erebus is a payload generator written in Nim.☆17Jun 13, 2023Updated 2 years ago
- eval() Exploit POC for Searchor 2.4.2 and lower☆11Apr 10, 2023Updated 3 years ago
- Sleep obfuscation in golang based on ekko☆14Jan 16, 2024Updated 2 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆30May 13, 2026Updated last week
- A TCP Backdoor made in python☆16Dec 18, 2021Updated 4 years ago
- Flipper Zero applications☆21Sep 24, 2025Updated 7 months ago
- A curated list of tools and resources that I use daily as a Purple-Team operator.☆100May 1, 2026Updated 2 weeks ago
- 🎥 Create videos programmatically in React☆17Mar 7, 2022Updated 4 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PoC executing shellcode in Dart☆15Jun 28, 2022Updated 3 years ago
- A Sigma based detection pipeline☆12Dec 15, 2023Updated 2 years ago
- An Incredibly Annoying, Insufferable Authentication Implementation☆31Apr 17, 2024Updated 2 years ago
- Simple Tool for webhacking☆10Apr 4, 2023Updated 3 years ago
- Automated compromise detection of the world's most popular packages☆16Sep 25, 2023Updated 2 years ago
- Fully obfuscated trojan generator for windows.☆10Jul 3, 2019Updated 6 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆15Aug 22, 2022Updated 3 years ago
- $5 Cyber Weapons & How to Use Them☆11Jul 25, 2022Updated 3 years ago
- DJI Duml Packet Parser☆11Sep 23, 2018Updated 7 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- C/C++ code obfuscator. Convert your code to a real one.☆12Sep 24, 2023Updated 2 years ago
- obfuscate your c++ code with an external text file!☆10Nov 19, 2014Updated 11 years ago
- A platform independent C++ code obfuscator.☆13Jul 20, 2019Updated 6 years ago
- This repository contains complete source code for setting up the environment and exploit code for the vulnerability.☆19Mar 23, 2023Updated 3 years ago
- ☆11Feb 26, 2019Updated 7 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago