marciopocebon / Tishna
Complete Automated pentest framework for Servers and Web Application Security
☆34Updated 4 years ago
Related projects: ⓘ
- Nuubi Tools (Information-ghatering|Scanner|Recon.)☆86Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆61Updated 3 years ago
- PeekABoo tool can be used during internal penetration testing when a user needs to enable Remote Desktop on the targeted machine. It uses…☆132Updated 5 years ago
- Super Simple Python Word List Generator for Fuzzing and Brute Forcing in Python☆48Updated 3 years ago
- Automate Metasploit scanning and exploitation☆108Updated this week
- XsSCan | Web Application XSS Scanner | Coded By Sir.4m1R [Mr.Hidden]☆72Updated 5 years ago
- Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one to…☆59Updated 3 years ago
- Flexible Penetrate Testing Auxiliary Suite☆71Updated last year
- Exploits project Hacking Command Center☆46Updated 11 months ago
- extensible exploitation framework shipped on a modular and multi-tasking architecture☆74Updated last year
- WAScan - Web Application Scanner☆20Updated 6 years ago
- A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impers…☆156Updated 2 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆116Updated 2 years ago
- Proof-of-concept exploit for CVE-2021-26855 and CVE-2021-27065. Unauthenticated RCE in Exchange.☆45Updated 3 years ago
- python script allow red teaming , hackthebox Pwners , OSCP lovers to shorten their time by these useful shells☆33Updated 3 years ago
- ☆97Updated this week
- Exploit Pack - Project☆67Updated 4 years ago
- Python-Based Pentesting Framework☆29Updated last year
- Tool to brute website sub-domains and dirs.☆47Updated 4 years ago
- ☆42Updated this week
- A guide explaining how to use Gophish☆36Updated 2 years ago
- Information-Gathering Shell Script☆28Updated 3 years ago
- Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pent…☆84Updated 2 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆46Updated 2 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆64Updated 2 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆42Updated 5 years ago
- gui tool to create normal payload by msfvenom☆31Updated 5 years ago
- A Web-UI for subdomain enumeration (subfinder)☆53Updated 4 years ago
- Messy BurpSuite plugin for SQL Truncation vulnerabilities.☆61Updated 4 years ago
- Enumerate a target Based off of Nmap Results☆77Updated 10 months ago