☆25Jan 18, 2015Updated 11 years ago
Alternatives and similar repositories for pentest_automation
Users that are interested in pentest_automation are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Tools for use with phishing frenzy☆11Jan 17, 2019Updated 7 years ago
- Portable utility to execute in memory a sequence of opcodes☆18Aug 28, 2016Updated 9 years ago
- PHP Phishing Framework☆28Dec 28, 2013Updated 12 years ago
- Security Advisories and Researches☆15Aug 19, 2014Updated 11 years ago
- CRL Monitor - X.509 Certificate Revocation List monitoring and X.509/Subject caching☆35Apr 16, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- ssdeep based clustering tool☆14Jan 17, 2016Updated 10 years ago
- Social Engineering Toys☆38Feb 1, 2016Updated 10 years ago
- Source for many challenges from DEF CON 21 CTF Finals☆33Apr 3, 2014Updated 12 years ago
- Vulnerability research on the CA UIM Nimbus protocol☆15Sep 28, 2020Updated 5 years ago
- ☆46Sep 28, 2017Updated 8 years ago
- Uses the default firebird database credentials to perform a database dump☆11Jan 10, 2015Updated 11 years ago
- Miscellaneous for various things☆21Nov 19, 2024Updated last year
- Passive DNS server interface compliant to "Common Output Format"☆10Sep 19, 2016Updated 9 years ago
- Binary reversing tool to find all possible code paths between two functions.☆28Apr 25, 2018Updated 7 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- GitBackdorizer (bad name, I know!) Is a proof of concept from Ulisses Castro's talk - 50 ton of backdoors (https://www.slideshare.net/uli …☆50May 15, 2018Updated 7 years ago
- Small scripts to assist in pentesting☆19Feb 2, 2021Updated 5 years ago
- My metasploit modules☆24Jan 8, 2016Updated 10 years ago
- metasploitHelper☆253Apr 3, 2020Updated 6 years ago
- Decrypt Matrix42 Empirum /EIS Passwords☆14Mar 31, 2021Updated 5 years ago
- Implementation of a Whois Server with a redis backend☆15Oct 31, 2010Updated 15 years ago
- Burp extension for processing requests and responses with Python.☆10Jun 19, 2018Updated 7 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 7 years ago
- Maltego Transform to put entities into MISP events☆28Jul 24, 2021Updated 4 years ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Desktop shortcuts (.desktop) create a risk for code execution via social engineering☆10Feb 6, 2017Updated 9 years ago
- uses keywords from alert logs to send SMS☆24Nov 20, 2015Updated 10 years ago
- Python script to test proxies☆15Jan 25, 2015Updated 11 years ago
- Shodan HQ nmap plugin - passively scan targets☆157Mar 14, 2016Updated 10 years ago
- Arya is a simple obfuscator for .NET binaries.☆37Dec 11, 2017Updated 8 years ago
- Use Frida DBI to instrument binary and perform basic-block code coverage that is fed back to AFL.☆12Nov 23, 2019Updated 6 years ago
- Scripts to process big chunks of data from MISP and do in depth correlations on samples.☆12Jul 2, 2016Updated 9 years ago
- Automatically exported from code.google.com/p/hookme☆13Oct 8, 2015Updated 10 years ago
- Proof of concept to use wifi beacons and RSSI (power signals) abuse to detect people forthcoming.☆13Mar 7, 2015Updated 11 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Auxiliary scripts for Incident Response with ELK☆11Oct 7, 2015Updated 10 years ago
- Vulnerability Assessment and Auditing Framework for all the Crypto Implementations.☆37Jun 11, 2016Updated 9 years ago
- Binary Ninja Plugin for Generating Callgraphs☆17Jun 17, 2025Updated 9 months ago
- Metasploit Usage Wiki☆48Feb 26, 2015Updated 11 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- Imports an LDAP file from Active Directory for SQL based offline reconnisance☆55Jun 1, 2016Updated 9 years ago