mahyarx / pentest-toolsLinks
a collection of best pentest resources
☆26Updated 6 years ago
Alternatives and similar repositories for pentest-tools
Users that are interested in pentest-tools are comparing it to the libraries listed below
Sorting:
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆47Updated 2 weeks ago
- ☆42Updated last month
- ☆74Updated last year
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Windows priviledge escalation script☆13Updated 4 months ago
- JoomSploit is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆26Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- A collection of exploits and exercises developed while preparing for the eCXD exam!☆30Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Proof of Concept Exploit for PaperCut CVE-2023-27350☆51Updated 2 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Red Teaming tools and techniques☆52Updated 2 years ago
- Exploit Development CheatSheet.☆16Updated 3 years ago
- Pentest/Red Team: Resources, repos and scripts.☆69Updated this week
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆73Updated last year
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆26Updated 5 months ago
- Unauthorized Access to Metadata and User Data like CTF☆27Updated 6 months ago
- Single Python Project enabling quick infrastructure loading (SMB Servers, HTTP File Server, FTP, Webpage, NetScanner)☆13Updated last year
- A collection of tools that I use in CTF's or for assessments☆98Updated 4 months ago
- Stuxnet extracted binaries by reversing & Stuxnet Rootkit Analysis☆56Updated 8 months ago
- quick and dirty proof-of-concept to hide shells in images☆50Updated 11 months ago
- ☆46Updated 4 years ago
- HydrAttack PoC eMail Spoofer Module is designed to test the security posture of a domain against email spoofing attacks. It performs step…☆20Updated 2 months ago
- ☆24Updated 4 months ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- AI/LLM local model integration for analysis of reconftw results☆58Updated last month