mahyarx / pentest-tools
a collection of best pentest resources
☆26Updated 6 years ago
Alternatives and similar repositories for pentest-tools
Users that are interested in pentest-tools are comparing it to the libraries listed below
Sorting:
- ☆64Updated last year
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 2 months ago
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆43Updated 2 weeks ago
- Internal Network Penetration Test Playbook☆20Updated 3 years ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆26Updated 10 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- A collection of tools that I use in CTF's or for assessments☆97Updated 3 months ago
- Tools used for Pentesting☆22Updated 2 years ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆33Updated last month
- ☆75Updated 10 months ago
- AI/LLM local model integration for analysis of reconftw results☆47Updated last week
- Windows priviledge escalation script☆13Updated 3 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- Tools and Resources for Physical Security Red Teaming☆31Updated last month
- Converting your Burp Suite projects into JSON APIs which can be viewed with Swagger editor or imported into Postman.☆65Updated 5 months ago
- A python3 script searching for secret on swaggerhub☆65Updated 3 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆17Updated last year
- ☆73Updated last year
- ☆39Updated 4 months ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated 2 years ago
- ☆26Updated 2 years ago
- Weaponized EvilnoVNC: Scalable and semi-automated MFA-Phishing☆47Updated 2 months ago
- List of MurmurHash3 favicon hashes of widely used technologies by vendor to search with Shodan.☆24Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- My Favorite Offensive Security Scripts☆71Updated 2 weeks ago
- quick and dirty proof-of-concept to hide shells in images☆49Updated 10 months ago
- Tool for scanning domains for .git directories.☆16Updated last year
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆23Updated last month
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆36Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆44Updated last year