A simple pentest container equipped with common python pentest tools.
☆42Jan 30, 2026Updated 3 weeks ago
Alternatives and similar repositories for pentest-python
Users that are interested in pentest-python are comparing it to the libraries listed below
Sorting:
- The results of my small term paper on the topic of the Internet of Vulnerable Things and the exploit for CVE-2022-48194.☆19Jan 20, 2023Updated 3 years ago
- ☆12Mar 18, 2025Updated 11 months ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆40Apr 3, 2023Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆32Jul 21, 2023Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Aug 13, 2023Updated 2 years ago
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆48Sep 30, 2024Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- ☆20Jul 7, 2024Updated last year
- ☆27May 1, 2023Updated 2 years ago
- bitdrain - remote p2p bandwidth/cpu overage attack against bitcoin, dogecoin, etc.☆37May 20, 2024Updated last year
- A simple command line tool which quickly audits the Disallow entries of a site's robots.txt.☆23Apr 5, 2023Updated 2 years ago
- ☆28Apr 4, 2023Updated 2 years ago
- Ethical Remote Acces Tool Client and Server for W10 and Linux Persist functionality☆50Feb 12, 2023Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- A collection of useful, small python3 scripts for penetration testing/ethical hacking which I created over the years.☆10Aug 13, 2022Updated 3 years ago
- quick and dirty proof-of-concept to hide shells in images☆51Jun 27, 2024Updated last year
- Windows And Ways To Break It☆100Jan 28, 2026Updated last month
- Active Directory Cheat Sheet☆145May 7, 2021Updated 4 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated 11 months ago
- Cobalt Strike Aggressor script create for RTO☆16Apr 11, 2024Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 2 years ago
- A simple tool to allows users to search for and analyze android apps for potential security threats and vulnerabilities☆87Apr 4, 2024Updated last year
- Field guide to gather low-hanging fruits☆14Mar 20, 2025Updated 11 months ago
- This central repository is crafted for cybersecurity enthusiasts, researchers, and professionals aiming to advance their skills. It offer…☆20May 22, 2025Updated 9 months ago
- Maltego Transforms for generating screenshots from Websites and URLs☆16Apr 24, 2023Updated 2 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Penetration Testing & Red Team tools & scripts☆12Sep 22, 2023Updated 2 years ago
- Ansible + Vagrant + Hyper-V + Vulnerable AD 😎☆91Aug 11, 2024Updated last year
- Scripts and piece of codes used for Active Directory configuration☆83Feb 14, 2023Updated 3 years ago
- This is a tool for bug hunters☆18Oct 16, 2025Updated 4 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Apr 10, 2024Updated last year
- Collection of ProjectDiscovery wallpapers☆34Oct 31, 2023Updated 2 years ago
- With Wireshark or TCPdump, you can determine whether there is harmful activity on your network traffic that you have recorded on the netw…☆146May 31, 2024Updated last year
- Hacking tool for enumeration and automated attacking. Port Scanner, Automatic SSH brute, DNS queries, IP and phonenumber geolocation☆14May 25, 2023Updated 2 years ago
- 1000 black hat tools Collected From github☆16Nov 28, 2019Updated 6 years ago
- ☆19Mar 4, 2023Updated 2 years ago
- A C# Tool to gather information about email breaches☆16Dec 21, 2023Updated 2 years ago
- sqlmap cheat sheet☆15Apr 6, 2023Updated 2 years ago