mariusv / Gray-Hacker-and-PenTestingLinks
☆24Updated 3 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
Sorting:
- A collection of awesome penetration testing resources☆13Updated 7 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆80Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆24Updated last year
- A python approach to interacting with web shells.☆30Updated 5 years ago
- New Framework Red Team Operations☆20Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 5 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Mobile Pentesting Guide (WIP)☆25Updated 5 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Custom pentesting tools☆26Updated 5 years ago
- ☆72Updated 5 months ago
- Create visualization from Shodan query☆75Updated 4 years ago
- Empower your enumeration during OSCP☆36Updated 7 years ago
- The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application pen…☆10Updated 9 years ago
- Low Interaction Mobile Honeypot☆97Updated 7 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆76Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆83Updated 5 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 5 years ago
- Modular framework to exploit UPS devices☆65Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- WebHook for Red Team☆25Updated 4 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆32Updated 4 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- Just a better dirbuster☆13Updated 3 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆105Updated last year
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆44Updated 2 years ago
- Tools for maintaining access to systems and proof-of-concept demonstrations.☆178Updated last week
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated 2 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Updated 2 months ago