mariusv / Gray-Hacker-and-PenTestingLinks
☆23Updated 3 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
Sorting:
- A multi threaded Python script designed to brute force directories and files names on webservers.☆77Updated 3 years ago
- A python approach to interacting with web shells.☆31Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- ☆29Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- CloudFlare-IP is a tool which aims to gather origin IP of the website protected by Cloudflare from the website's favicon icon using Shoda…☆44Updated 5 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Simple API for storing all incoming XSS requests and various XSS templates.☆47Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆19Updated 7 months ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Write-Ups for TryHackMe☆22Updated 4 years ago
- Classic Web shell upload techniques & Web RCE techniques☆32Updated 8 months ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.☆39Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 7 months ago
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆18Updated 3 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- Create visualization from Shodan query☆74Updated 4 years ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 4 years ago
- Run search-that-hash from Google colab with fast offline (hashcat) mode☆35Updated 4 years ago