mariusv / Gray-Hacker-and-PenTesting
☆22Updated 2 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting:
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
- New Framework Red Team Operations☆17Updated 3 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆29Updated 7 months ago
- Small python script wrapper for automating hashcat commands☆37Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆26Updated 4 years ago
- Classic Web shell upload techniques & Web RCE techniques☆27Updated 4 months ago
- Tool to transfer credential files from Firefox to your local machine to decrypt offline.☆23Updated 3 years ago
- Enumeration & fingerprint tool☆24Updated last year
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 8 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- ☆14Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆24Updated 2 years ago
- Modular framework to exploit UPS devices☆63Updated 2 years ago
- ☆28Updated 2 years ago
- Internal Network Penetration Test Playbook☆19Updated 3 years ago
- Pentesting notes☆17Updated last week
- Tactics, Techniques, and Procedures☆25Updated last month
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Offensive Security Wireless Professional☆17Updated 4 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- Central IoC scanner based on Loki☆20Updated 3 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- The Kill-The-Code Python Program provides a robust mechanism for remotely controlling code execution by monitoring a specified URL for a …☆16Updated 7 months ago
- A python approach to interacting with web shells.☆29Updated 4 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆22Updated 7 months ago
- Empower your enumeration during OSCP☆35Updated 6 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- Multipurpose tool, currently aimed for HackTheBox Battlegrounds☆20Updated 4 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆39Updated 11 months ago