marius-rothenbuecher / PentestBroLinks
Experimental tool for Windows. PentestBro combines subdomain scans, whois, port scanning, banner grabbing and web enumeration into one tool. Uses subdomain list of SecLists. Uses nmap service probes for banner grabbing. Uses list of paths for web enumeration.
☆60Updated 4 years ago
Alternatives and similar repositories for PentestBro
Users that are interested in PentestBro are comparing it to the libraries listed below
Sorting:
- PyQT5 app for LOLBAS and GTFOBins☆45Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 2 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Custom pentesting tools☆25Updated 4 years ago
- A customizable, easy-to-navigate tool for researching, pen testing, and defending with the power of Shodan.☆120Updated last year
- Stealthy Stand Alone PHP Web Shell☆33Updated 5 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆53Updated 3 months ago
- A *nix Enumerator & Auto Privilege Escalation tool.☆151Updated 3 years ago
- Red Team tool for exfiltrating the target organization's Google People Directory that you have access to, via Google's API.☆60Updated 3 years ago
- HTTP Server serving obfuscated Powershell Scripts/Payloads☆94Updated 4 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆64Updated 2 years ago
- Google Drive, OneDrive and Youtube as covert-channels - Control systems remotely by uploading files to Google Drive, OneDrive, Youtube or…☆68Updated 3 years ago
- fsp - Firestore Database Vulnerability Scanner Using APKs☆64Updated 4 years ago
- Disable Windows Defender All Version☆32Updated 4 years ago
- A simple Python script that reads a text file with lots of e-mails and passwords, and tries to check if those credentials are valid by tr…☆72Updated last year
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Router socks. One port socks for all the others.☆69Updated last year
- Command Execution exploiter with an auto connection handling☆33Updated 3 years ago
- A powerful reverse shell generator☆44Updated 3 years ago
- Some random tools I use for penetration testing☆91Updated 4 months ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- An AV exclusion enumeration tool written in Python.☆59Updated 3 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 4 years ago
- PickleC2 is a post-exploitation and lateral movements framework☆96Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- PowerShell payload generator☆117Updated 3 years ago
- Bypass Windows Defender with py2exe from memory.☆36Updated 3 years ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Just another script for automatize boolean-based blind SQL injections. (Demo)☆54Updated 2 years ago