mariusv / Gray-Hacker-and-PenTesting
☆23Updated 2 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting:
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
- Offensive Security Wireless Professional☆17Updated 4 years ago
- Files for my Python3 Create Your Own Tool Series☆23Updated 2 years ago
- Ethical hacking, CTF, tools & etc☆21Updated 3 years ago
- Classic Web shell upload techniques & Web RCE techniques☆25Updated 2 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Internal Network Penetration Test Playbook☆18Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- A python approach to interacting with web shells.☆29Updated 4 years ago
- Pentesting notes☆17Updated last year
- Create visualization from Shodan query☆72Updated 3 years ago
- This repository hosts PoC exploits for vulnerabilities I've discovered, provided for education and to highlight the importance of system …☆19Updated last year
- shellDAVpass application is the Open-Source project, the main idea of which is to bypass the defender and AntiVirus detections to conduct…☆25Updated 8 months ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- ☆28Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Information-Gathering Shell Script☆29Updated 4 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated 2 months ago
- Operating System testbed created with Terraform to test payloads, programs and compatibility on different OS versions. Supports AWS and A…☆18Updated last year
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆21Updated 6 months ago
- A collection of commands, scripts, tips, tricks, and other information compiled during my journey to obtaining the OSCP certification.☆23Updated 4 years ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 6 months ago