A simple pentest container equipped with common python pentest tools.
☆42Jan 30, 2026Updated last month
Alternatives and similar repositories for pentest-python
Users that are interested in pentest-python are comparing it to the libraries listed below
Sorting:
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Feb 17, 2024Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆112Feb 3, 2026Updated last month
- ☆12Mar 18, 2025Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Active Directory Cheat Sheet☆145May 7, 2021Updated 4 years ago
- ☆20Jul 7, 2024Updated last year
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 3 months ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- ☆25Aug 2, 2023Updated 2 years ago
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37May 20, 2024Updated last year
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- SourceGPT - prompt manager and source code analyzer built on top of ChatGPT as the oracle☆109Apr 14, 2023Updated 2 years ago
- Red Team Guides☆145Jan 3, 2024Updated 2 years ago
- This repository contains a curated list of resources I suggest on LinkedIn and Twitter.📝🌝☆655May 4, 2024Updated last year
- Windows And Ways To Break It☆100Jan 28, 2026Updated last month
- A Red Teaming tool focused on profiling the target.☆29Jan 10, 2026Updated 2 months ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- freeBokuLoader fork which targets and frees Metsrv's initial reflective DLL package☆35Mar 28, 2023Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- ☆29Aug 12, 2021Updated 4 years ago
- Remote persistent 🔑Logger for Windows and Linux☆295Apr 21, 2023Updated 2 years ago