a collection of best pentest resources
☆29Feb 4, 2019Updated 7 years ago
Alternatives and similar repositories for pentest-tools
Users that are interested in pentest-tools are comparing it to the libraries listed below
Sorting:
- Outlast Trials C++ cheat, feel free to contribute <3☆14Jun 30, 2024Updated last year
- ☆12Jul 14, 2025Updated 7 months ago
- ☆11Feb 26, 2019Updated 7 years ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- A simple, reliable and reasonably fast network capture analyzer.☆26Updated this week
- a bitcoin faucet script that drips from MoneyPot's global faucet☆11Jan 31, 2016Updated 10 years ago
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆13Feb 7, 2017Updated 9 years ago
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- dotfiles☆11Feb 20, 2026Updated 2 weeks ago
- ☆45Feb 2, 2025Updated last year
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- Awesome Libs app☆11Jan 30, 2021Updated 5 years ago
- Alfred 3 workflow to find to projects in github☆14Oct 26, 2021Updated 4 years ago
- A curated list of API Platform libraries, resources and shiny things.☆12Nov 22, 2021Updated 4 years ago
- A curated list of awesome iOS UI/UX libraries. With repository stars⭐ and forks🍴☆11Feb 28, 2026Updated last week
- A free set of messeging modules for the MetaTrader platform☆14Dec 8, 2022Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- A curated list of awesome iOS resources, including conferences, books, blogs, articles, websites and documentations☆12Feb 22, 2019Updated 7 years ago
- A Simple Telegram Bot to Download Mega Links☆15Dec 3, 2021Updated 4 years ago
- Docker files for Miasm☆17Apr 27, 2018Updated 7 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Get VirusTotal report for a given hash using PowerShell☆10Sep 20, 2022Updated 3 years ago
- deploy your own new www tor*.onion in 10 seconds using 1 file only☆15Sep 18, 2018Updated 7 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- All in one monitoring for NKN.org Crypto currency Miners!☆15Mar 24, 2022Updated 3 years ago
- The EMP Jammer is an innovative jamming device which jams the devices nearby by inducing an alternating voltage in it .☆13Jan 3, 2023Updated 3 years ago
- View Rails casts video on Apple TV☆12May 11, 2016Updated 9 years ago
- ☆15May 26, 2014Updated 11 years ago
- Awesome list of awesome website from my bookmarks. Download bookmarks also.☆11Jul 29, 2023Updated 2 years ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- Simple frontend for Google Custom Search Engine☆13Apr 17, 2024Updated last year
- A huge collection of Digital Marketing Content I have written over the years, available to help you grow your business.☆11Apr 18, 2018Updated 7 years ago
- ☆10Sep 13, 2024Updated last year
- ☆13Sep 14, 2014Updated 11 years ago
- A curated list of outsourcing resources.☆15Dec 28, 2020Updated 5 years ago
- A Fediverse phrase bot inspired by YouTube videos and urban legends about the Deep Web.☆11Jun 4, 2022Updated 3 years ago
- EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware☆14Dec 13, 2022Updated 3 years ago
- iOS cryptocurrency exchange-rate app, custom caching for API calls and data.☆11Aug 12, 2018Updated 7 years ago