nop-tech / PentestingLinks
My Collection of exploits, reverse shells, scripts and more
☆14Updated 2 years ago
Alternatives and similar repositories for Pentesting
Users that are interested in Pentesting are comparing it to the libraries listed below
Sorting:
- ☆38Updated 4 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆45Updated 2 months ago
- ☆38Updated 3 years ago
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆25Updated last year
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- ☆44Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆76Updated last year
- Offensive Security OSWE Prep 2022☆74Updated 3 years ago
- ☆27Updated 3 years ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆63Updated 9 months ago
- Linux Post-Exploitation tools wrapper☆20Updated 2 years ago
- ☆47Updated 3 years ago
- ☆48Updated 4 years ago
- ☆93Updated 8 months ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- ☆31Updated 4 years ago
- A Python based ingestor for BloodHound☆85Updated 3 years ago
- Notes for CRTP☆41Updated 4 years ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆22Updated last year
- PowerShell script to automate enabling RDP, local admin user creation, and configuring firewall rules for RDP access.☆36Updated 8 months ago
- Automate converting webshells into reverse shells.☆70Updated this week
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- Notes and cheatsheets for the OffSec Wireless Professional (OSWP) certification☆42Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated last month
- Creating a Malicious Macro using MS Word☆24Updated 3 years ago
- ☆16Updated 6 years ago
- ☆21Updated last year
- Simple python which takes FirstName and LastName to generate possible AD Usernames. Usefull for OSCP, Labs...☆24Updated 8 months ago