mariusv / Gray-Hacker-and-PenTestingLinks
☆23Updated 3 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
Sorting:
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆65Updated 5 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆61Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- Random Exploits☆50Updated last year
- ☆69Updated 2 weeks ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆88Updated last year
- Classic Web shell upload techniques & Web RCE techniques☆33Updated 9 months ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆65Updated 3 years ago
- Custom pentesting tools☆25Updated 4 years ago
- Rodan Exploitation Framework☆101Updated 3 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- Collection of scripts and documentations of retired machines in the hackthebox.eu platform☆41Updated 5 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 9 months ago
- Low Interaction Mobile Honeypot☆95Updated 2 months ago
- Simple 5060 port exploit that calls to a receiver device with pre-setuped phrase☆33Updated 3 years ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- ☆15Updated this week
- Create visualization from Shodan query☆75Updated 4 years ago