☆26Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for Pentest_checklist
Users that are interested in Pentest_checklist are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year
- ☆10Aug 6, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- a Modular web penetration testing interface☆15Feb 20, 2026Updated last month
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- An accurated list of things to test while pentesting☆11Jan 2, 2021Updated 5 years ago
- This tool allows you to run programs as another user from the Windows command line. Example usage is if you have a low privilege shell an…☆21Apr 4, 2022Updated 3 years ago
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- ☆10Nov 27, 2020Updated 5 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- the zero-impact configuration system☆10Aug 8, 2020Updated 5 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- a simple netcat wrapper☆16Apr 10, 2017Updated 8 years ago
- Zero dependency browser extension for handling import of cookies, Microsoft 365 OAuth tokens, and Graph API interactions.☆23Updated this week
- abusing misconfiguration for AD with LAPS☆11Jan 25, 2024Updated 2 years ago
- Log trades of any type of security, and then get an analysis of your strategy☆13Sep 18, 2020Updated 5 years ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- A small script to import and ban IPs from a list (like from blocklist.de)☆14Oct 23, 2016Updated 9 years ago
- Burp extension to fuzz/brute force GenAI/LLM prompts for potential behvioural and Prompt Injection vulnerabilities.☆13Sep 3, 2025Updated 6 months ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- A simple e-certificate generator. Web-based app used to generate e-certificate in PDF format for an event.☆25Dec 25, 2021Updated 4 years ago
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆14May 15, 2019Updated 6 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- ☆34May 11, 2021Updated 4 years ago
- Testing client for XMPP - display XML stanzas send/received☆16Aug 6, 2015Updated 10 years ago
- Collection of tools, scripts, one-liners, templates, dorks and more☆12Dec 13, 2025Updated 3 months ago
- Extract Sensitive Keys, Secret, Token Or Interested thing from source☆52Jun 4, 2020Updated 5 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆119Feb 16, 2025Updated last year
- 就是一个练习RMI反序列化的最简单环境☆30Jan 8, 2022Updated 4 years ago
- ☆12Aug 29, 2021Updated 4 years ago
- A Terminator plugin which attempts to figure out your current host, and apply a certain theme.☆25Oct 5, 2025Updated 5 months ago