mariusv / Gray-Hacker-and-PenTestingLinks
☆23Updated 3 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
Sorting:
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆37Updated 4 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆13Updated 3 years ago
- Low Interaction Mobile Honeypot☆95Updated 3 months ago
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- [180+ scripts] There are a few genuine gems in there. And a lot of spaghetti code. Most of these scripts were for solving CTF's. If you …☆63Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Simple script to download some missing tools in Kali☆33Updated 4 years ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆62Updated 4 years ago
- IoT Hacking Kit Details☆18Updated last month
- Writeups for Hack The Box machines/challenges☆27Updated 3 years ago
- CVE-2020-20093; 20094; 20095; 20096, 2022-28345 RTLO Injection URI Spoofing☆89Updated last year
- Create visualization from Shodan query☆75Updated 4 years ago
- Public Exploits☆10Updated 4 years ago
- A collection of tools created for computer security research purposes.☆126Updated 5 years ago
- WebHook for Red Team☆26Updated 4 years ago
- Create a VPS on Google Cloud Platform or Digital Ocean easily with Offensive Docker included to launch assessment to the targets.☆81Updated 4 years ago
- A collection of awesome penetration testing resources☆14Updated 6 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆34Updated 7 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆13Updated 9 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago