Complete Automated pentest framework for Servers and Web Application Security
☆38Nov 4, 2019Updated 6 years ago
Alternatives and similar repositories for Tishna
Users that are interested in Tishna are comparing it to the libraries listed below
Sorting:
- A simple shell script which utilizes nmap, nikto, dirb, enum4linux and other open source goodies to automate enumeration process.☆19Jan 13, 2022Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆12Sep 18, 2015Updated 10 years ago
- ☆15May 17, 2018Updated 7 years ago
- Vulnerability Scanner☆11Dec 23, 2014Updated 11 years ago
- Complete Automated pentest framework for Servers, Application Layer to Web Security☆11Dec 14, 2019Updated 6 years ago
- 💻 GitClin V1.0 for downloading and installing tools☆15Mar 30, 2018Updated 7 years ago
- 🔥Ready, Aim, Fire.🔥☆18Jun 3, 2022Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆31Jun 19, 2022Updated 3 years ago
- Golang based web service to scan files with yara rules☆25Jul 6, 2017Updated 8 years ago
- Open Security Summit 2019☆26Nov 16, 2020Updated 5 years ago
- ALAT TOLL KEPERLUAN ONLINE☆13Jan 10, 2019Updated 7 years ago
- A repository of compiled and ready-to-use shells for Windows restricted environments.☆35Feb 19, 2020Updated 6 years ago
- My notebook for OSCP Lab☆26Aug 6, 2017Updated 8 years ago
- iSMET (A)symmetric Meterpreter Encryption Tool☆26Oct 26, 2020Updated 5 years ago
- ☆26Sep 2, 2016Updated 9 years ago
- ☆32Oct 5, 2016Updated 9 years ago
- A small utility to generate a word security report by using a knowledge base(XLSX).☆12Nov 25, 2023Updated 2 years ago
- Azure Template Skype for Business lab V3 with Edge, ADFS and PSTN Gateway☆13May 2, 2017Updated 8 years ago
- NetBeans plugin for OpenCart☆10Nov 18, 2015Updated 10 years ago
- A tool for Pentesters & BugHunters to collect IPs of company, server, Operating System & many more☆13Dec 20, 2022Updated 3 years ago
- A beginners guide to exploiting Buffer Oveflow vulnerabilities using Ollydbg simular to offensive security techniques.☆10May 3, 2019Updated 6 years ago
- A Jenkins plugin to view the dependency graph☆17Mar 14, 2024Updated last year
- T.U.F.F. - Targeted Utility for Fast Forensics is mainly used to recon websites and IP addresses for vulnerabilities for an easier pentes…☆11May 26, 2023Updated 2 years ago
- On-Premises Open Cyber Threat Intelligence Platform☆11Oct 29, 2024Updated last year
- Tool for viewing Android package details, including permissions, services, activities, and more.☆22Nov 30, 2012Updated 13 years ago
- Burp extension to specify the token value for the Authenication header while scanning.☆10Sep 18, 2018Updated 7 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Sep 6, 2024Updated last year
- Tamper Active Directory user attributes to collect their hashes with MS-SNTP☆65Jan 21, 2025Updated last year
- VulnWhisperer Stack (ELK + VulnWhisperer + OpenVAS + Nessus)☆13Aug 14, 2018Updated 7 years ago
- ☆12Mar 24, 2018Updated 7 years ago
- terminal customization☆10Dec 17, 2022Updated 3 years ago
- A minimalistic PHP implementation of the Jinja templating engine, specifically designed for parsing and rendering ML chat templates.☆13Oct 27, 2025Updated 4 months ago
- docker build nessus with unlimited ip☆13Aug 23, 2021Updated 4 years ago
- RKD - RiotKit DO. Task executor - balance between Makefile and Gradle. Written in Python. Powerful tool for every DevOps. Automates produ…☆10May 6, 2022Updated 3 years ago
- Download raw (free) APKs from Google Play Store☆10Apr 26, 2018Updated 7 years ago
- Cross Site Scripting Cheat sheet.☆12Apr 3, 2021Updated 4 years ago
- Leonardo-Arduino script and python keylogger for BAD-USB aka Poor Man's RUBBER-DUCKY☆12Aug 14, 2020Updated 5 years ago
- Ansible role to manage network interface configuration in Debian-like systems☆10Nov 2, 2023Updated 2 years ago
- Bug Bounty Monitor☆15Nov 23, 2020Updated 5 years ago