mariusv / Gray-Hacker-and-PenTestingLinks
☆23Updated 3 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
Sorting:
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆32Updated 3 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆36Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- ☆69Updated last month
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- ☆27Updated 6 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆84Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆103Updated last year
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- A collection of open source and commercial tools that aid in red team operations.☆11Updated 6 years ago
- A collection of tools created for computer security research purposes.☆132Updated 5 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆34Updated 7 years ago