majidkalantarii / AwesomePenetrationTest
☆11Updated 4 years ago
Related projects: ⓘ
- A collection of awesome penetration testing resources☆14Updated 5 years ago
- ☆14Updated 4 years ago
- ☆11Updated this week
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆15Updated 2 years ago
- ☆53Updated this week
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- ☆17Updated this week
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated last year
- Create visualization from Shodan query☆70Updated 3 years ago
- Forensic Imaging quickstarts!☆13Updated 2 years ago
- Information-Gathering Shell Script☆28Updated 3 years ago
- ☆45Updated 6 years ago
- ☆12Updated this week
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 3 months ago
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆16Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- ☆24Updated 4 years ago
- Mango is a user interactive Powershell program to search for possible privilege escalation vectors on windows☆14Updated 3 years ago
- Super organized and flexible script for sending phishing campaigns☆54Updated 2 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆19Updated last year
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆28Updated 4 years ago
- Small python script to look for common vulnerabilities on SMTP server.☆46Updated 9 months ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated last year
- Cheatsheet collection of Infosec tools☆15Updated 5 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆15Updated last year
- Web application pentesting recon☆23Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆72Updated 3 years ago