☆26Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for Pentest_checklist
Users that are interested in Pentest_checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year
- ☆10Aug 6, 2019Updated 6 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- a Modular web penetration testing interface☆15Feb 20, 2026Updated last month
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆12Apr 22, 2018Updated 7 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- System Administrator Appreciation Day☆11Aug 1, 2025Updated 7 months ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Updated this week
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Log trades of any type of security, and then get an analysis of your strategy☆13Sep 18, 2020Updated 5 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆64Feb 6, 2022Updated 4 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A simple e-certificate generator. Web-based app used to generate e-certificate in PDF format for an event.☆25Dec 25, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- CTF write-ups by PDKT team with English and Indonesian language☆75Jun 3, 2019Updated 6 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 5 years ago
- CVE-2021-33909 Sequoia☆46Sep 2, 2021Updated 4 years ago
- This is php backdoor hack to access directory, access to mysql, access to execute shell command☆25Oct 23, 2015Updated 10 years ago
- Python based tool for generating Shellcode from PIC C☆43Nov 6, 2025Updated 4 months ago
- ☆34May 11, 2021Updated 4 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 3 months ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.