A Jenkins Pentest/Security Toolkit written in Python
☆15Sep 18, 2017Updated 8 years ago
Alternatives and similar repositories for pyJenkinsToolkit
Users that are interested in pyJenkinsToolkit are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Local enumeration and exploitation framework.☆18Aug 16, 2017Updated 8 years ago
- ☆26Dec 8, 2025Updated 3 months ago
- Various fuzzers written in Python. Currently has a TCP server for fuzzing client software, and a CLI fuzzer to use against programs ran f…☆11Feb 14, 2018Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Nohidy the system admins best friend, multi platform auditing tool☆14Feb 6, 2018Updated 8 years ago
- ☆11Oct 3, 2019Updated 6 years ago
- Fault injection library☆22Dec 2, 2014Updated 11 years ago
- Just another tool to screenshot web servers☆16Feb 8, 2023Updated 3 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Jun 10, 2017Updated 8 years ago
- A set of XSS vulnerable PHP scripts for testing☆39Feb 10, 2013Updated 13 years ago
- A Proof of Concept (PoC) IRC backdoor written in Python☆11Jan 29, 2021Updated 5 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Mar 19, 2025Updated last year
- Security tools, scanners, exploit code☆31Oct 21, 2017Updated 8 years ago
- Fingerprints servers, finds exploits, scans WebDAV. May or may not also make coffee.☆123Jul 9, 2019Updated 6 years ago
- Files for the Defcon Toronto Introduction to 64-bit Linux Exploitation☆15Feb 23, 2018Updated 8 years ago
- Windows login backdoor diagnostic tool☆11Apr 2, 2017Updated 8 years ago
- Updated version of SWFIntruder☆27Aug 16, 2016Updated 9 years ago
- PoC attack server for CVE-2015-7547 buffer overflow vulnerability in glibc DNS stub resolver (public version)☆10Apr 25, 2016Updated 9 years ago
- Make your Gemfile safe by adding dependency version specifiers automatically☆12Jun 5, 2019Updated 6 years ago
- potentially dangerous files for dirbusting☆15Feb 20, 2016Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Oct 17, 2017Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Jan 19, 2016Updated 10 years ago
- Various pentest scripts☆14Mar 17, 2014Updated 12 years ago
- strings for a Linux process' address space☆51Jun 15, 2013Updated 12 years ago
- Pagemon is an interactive memory/page monitoring tool allowing one to browse the memory map of an active running process.☆48Mar 2, 2026Updated 3 weeks ago
- Scrape Twitter for long hashtags that could be used as passwords☆10Jan 4, 2017Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- The official repo of BSIS☆14Feb 16, 2012Updated 14 years ago
- http-dir-enum is a tool for finding content that is not linked on a website. Its main use is for finding directories that exist on a serv…☆15Jun 13, 2021Updated 4 years ago
- Learning about disassembling☆20Oct 28, 2019Updated 6 years ago
- A commandline vulnerability reporter using WP-CLI and WPVulnDB☆31Sep 27, 2025Updated 5 months ago
- Index all certificates from certificate transparancy into Elasticsearch☆22Nov 22, 2017Updated 8 years ago
- EasyCTF Writeups☆13Jan 10, 2015Updated 11 years ago
- Educational Exploitable Web Application☆24Feb 9, 2016Updated 10 years ago
- Script to test NetSec capabilities.☆21May 1, 2023Updated 2 years ago
- Writeups for various crackmes, CTFs, wargames, etc.☆15Apr 21, 2017Updated 8 years ago
- Burp extension to automatically drop requests that match a certain regex.☆10Mar 10, 2023Updated 3 years ago
- ☆20Jan 12, 2022Updated 4 years ago
- Subdomain Analyzer☆77Apr 18, 2017Updated 8 years ago