mehransab101 / Learning-Pentesting-With-Python
Learning-Pentesting-With-Python
☆20Updated 6 years ago
Alternatives and similar repositories for Learning-Pentesting-With-Python:
Users that are interested in Learning-Pentesting-With-Python are comparing it to the libraries listed below
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Pentest ToolKit☆27Updated 4 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 5 years ago
- Serbian/English wordlist for https://github.com/maurosoria/dirsearch☆19Updated 7 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Commands to perform various activities related to penetration testing and red teaming☆20Updated 5 years ago
- Scrapes Router Passwords From http://www.routerpasswords.com ,more then +300 product☆46Updated 7 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 6 years ago
- Open Penetration Testing Bookmarks Collection☆19Updated 9 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 7 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆38Updated 6 years ago
- Dockerfile with advanced configurations for Offensive Docker.☆13Updated 4 years ago
- Automate the creation of Backdoors and postexplotation activities☆22Updated 2 years ago
- ☆17Updated 11 months ago
- An email client in CLI, designed specifically for spearphishing.☆13Updated 5 years ago
- python scripts for penetration testing☆11Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- Collection of cracked malware☆14Updated 6 years ago
- ☆15Updated last year
- Basic Binary Exploitation / Buffer Overflows☆11Updated 7 years ago