mariusv / Gray-Hacker-and-PenTestingLinks
☆23Updated 3 years ago
Alternatives and similar repositories for Gray-Hacker-and-PenTesting
Users that are interested in Gray-Hacker-and-PenTesting are comparing it to the libraries listed below
Sorting:
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Bash Recon Scan - Recon and Scan a network using Bash☆30Updated 3 years ago
- Zero-Day Code Injection and Persistence Technique☆34Updated 8 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- New Framework Red Team Operations☆19Updated 4 years ago
- Write-Ups for TryHackMe☆24Updated 4 years ago
- A multi threaded Python script designed to brute force directories and files names on webservers.☆78Updated 3 years ago
- WebHook for Red Team☆26Updated 4 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆22Updated 3 years ago
- Basics on commands/tools/info on how to do binary exploitation on a mobile phone☆56Updated 2 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- Automate All Pivoting System Enumeration with this Bash Script☆13Updated 2 years ago
- Learning-Pentesting-With-Python☆20Updated 7 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- Awesome Hardware Hacking - It contains notes and resources for hacking into hardware. Open for contributions, add writeup/blogs links on…☆54Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆33Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Enumeration & fingerprint tool☆24Updated last year
- a drop-in replacement for Nmap powered by shodan.io☆10Updated 3 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆14Updated 9 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆16Updated 2 years ago
- Empower your enumeration during OSCP☆36Updated 6 years ago
- Simple API for storing all incoming XSS requests and various XSS templates.☆46Updated last year
- Red Team tools, infrastructure, and hardware weaponized☆108Updated 3 weeks ago
- A list of webshells☆15Updated 2 years ago