A simple pentest container equipped with common python pentest tools.
☆43Jan 30, 2026Updated 2 months ago
Alternatives and similar repositories for pentest-python
Users that are interested in pentest-python are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A Reverse Shell which uses an XML file on an SMB share as a communication channel.☆17Feb 17, 2024Updated 2 years ago
- ☆12Mar 18, 2025Updated last year
- Automate Scoping, OSINT and Recon assessments.☆114Feb 3, 2026Updated 2 months ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆30Aug 13, 2023Updated 2 years ago
- ☆20Jul 7, 2024Updated last year
- Active Directory Cheat Sheet☆203May 7, 2021Updated 4 years ago
- ARP Spoofing Defender is a project designed to protect local networks from ARP Spoofing attacks. ARP Spoofing Defender provides mechanism…☆23Nov 24, 2025Updated 4 months ago
- Automated HTTP Request Repeating With Burp Suite☆39Apr 3, 2023Updated 3 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Sep 30, 2024Updated last year
- quick and dirty proof-of-concept to hide shells in images☆52Jun 27, 2024Updated last year
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 3 years ago
- ☆25Aug 2, 2023Updated 2 years ago
- ☆27May 1, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- ☆120Mar 28, 2025Updated last year
- Simple, predictable pricing with DigitalOcean hosting • AdAlways know what you'll pay with monthly caps and flat pricing. Enterprise-grade infrastructure trusted by 600k+ customers.
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Scripts and piece of codes used for Active Directory configuration☆82Feb 14, 2023Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets