mahyarx / pentest-toolsView external linksLinks
a collection of best pentest resources
☆29Feb 4, 2019Updated 7 years ago
Alternatives and similar repositories for pentest-tools
Users that are interested in pentest-tools are comparing it to the libraries listed below
Sorting:
- Educational Satellite for Learning CubeSat☆20Jul 21, 2023Updated 2 years ago
- Outlast Trials C++ cheat, feel free to contribute <3☆14Jun 30, 2024Updated last year
- A simple, reliable and reasonably fast network capture analyzer.☆24Updated this week
- Vanitygen plus! Generate vanity address for 80+ cryptocoins including: BTC, LTC, LBRY, UNO, DASH, DOGE, FEATHER, GROESTL, MONA, PEERCOIN,…☆12Feb 7, 2017Updated 9 years ago
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- ☆11Feb 26, 2019Updated 6 years ago
- A collection of practical implementation of security recommendations☆13Sep 24, 2024Updated last year
- SQL Injection attack is the most common website hacking technique. Most websites use Structured Query Language (SQL) to interact with dat…☆12Jul 16, 2022Updated 3 years ago
- Bank-Management-System This is a project made on (Python and MySql) which consists of the Bank Management System for a bank where a bank …☆12Oct 29, 2022Updated 3 years ago
- a bitcoin faucet script that drips from MoneyPot's global faucet☆11Jan 31, 2016Updated 10 years ago
- Web Exploit here ! advanced web hacking and hacker toolkit in your hands☆44Aug 17, 2024Updated last year
- ☆15May 26, 2014Updated 11 years ago
- A free set of messeging modules for the MetaTrader platform☆14Dec 8, 2022Updated 3 years ago
- A huge collection of Digital Marketing Content I have written over the years, available to help you grow your business.☆11Apr 18, 2018Updated 7 years ago
- Leveraging Platform Trust Technology (PTT) to defeat Driver Signing Enforcement (DSE) to run Kernel Drivers (KMDF) with Secure Boot Enabl…☆13Aug 22, 2022Updated 3 years ago
- Get VirusTotal report for a given hash using PowerShell☆10Sep 20, 2022Updated 3 years ago
- A spring boot validation library from laravel.☆12Sep 6, 2023Updated 2 years ago
- A curated list of awesome iOS UI/UX libraries. With repository stars⭐ and forks🍴☆11Updated this week
- RFM69 ISM Transceiver driver for esp-idf☆11Nov 27, 2025Updated 2 months ago
- Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It support…☆15Feb 2, 2025Updated last year
- All in one monitoring for NKN.org Crypto currency Miners!☆15Mar 24, 2022Updated 3 years ago
- Side-channel attac☆10Mar 25, 2022Updated 3 years ago
- Alfred 3 workflow to find to projects in github☆14Oct 26, 2021Updated 4 years ago
- I just wanted to try to do it myself. No more updates for the moment as the firmware is now too big for the radio's memory.☆10Jan 15, 2024Updated 2 years ago
- A Simple Telegram Bot to Download Mega Links☆15Dec 3, 2021Updated 4 years ago
- A simple python wrapper for NASA's SPICE-framework☆13Mar 19, 2016Updated 9 years ago
- "Sonic Kernel Testing" - a Linux Kernel testing tool - moved to gitlab.com☆11May 25, 2020Updated 5 years ago
- This repo conatains all the types of tutorials be it videos, pdfs, code snippets etc of every popular technology☆11Aug 31, 2019Updated 6 years ago
- Sleep obfuscation in golang based on ekko☆13Jan 16, 2024Updated 2 years ago
- stream the user interface into floating icons, similar to the popular world of warcraft addon "weak auras"☆11Dec 14, 2020Updated 5 years ago
- Erebus is a payload generator written in Nim.☆16Jun 13, 2023Updated 2 years ago
- Simple and highly-optimized memory & RTTI reading☆11Jan 21, 2022Updated 4 years ago
- squad-external-base☆19May 4, 2023Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- EM-Fault It Yourself: Building a Replicable EMFI Setup for Desktop and Server Hardware☆14Dec 13, 2022Updated 3 years ago
- C/C++ code obfuscator. Convert your code to a real one.☆12Sep 24, 2023Updated 2 years ago
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- Fully obfuscated trojan generator for windows.☆11Jul 3, 2019Updated 6 years ago
- Technological projects related to psychology and mental health.☆19Nov 14, 2022Updated 3 years ago