obheda12 / JupyterPen
A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks
☆145Updated 4 years ago
Alternatives and similar repositories for JupyterPen
Users that are interested in JupyterPen are comparing it to the libraries listed below
Sorting:
- Pentesting/Bugbounty Dockerfiles.☆176Updated 3 years ago
- A Linux enumeration script for Hack The Box☆189Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆41Updated 4 years ago
- A Google/Bing Scraping tool for LinkedIn☆93Updated last year
- Parse .nessus file(s) and shows output in interactive UI☆150Updated 2 weeks ago
- ☆150Updated last year
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- ASN reconnaissance script☆127Updated last year
- Active Directory Lab for Penetration Testing☆51Updated 4 years ago
- 👹☆56Updated 3 years ago
- ☆71Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆53Updated 2 years ago
- List of Repositories☆98Updated 3 years ago
- Python template to assist with buffer overflows☆71Updated 5 years ago
- ☆99Updated 2 months ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 3 years ago
- Various Payload wordlists☆236Updated 2 weeks ago
- OSCP guide and Red Team assessment Guide☆35Updated 4 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Stuff done in preparation for AWAE course and OSWE certification☆152Updated 4 years ago
- A Burp Suite Extension to pull Employee Names from Google and Bing LinkedIn Search Results☆193Updated 10 months ago
- NessusV2 File Parser☆65Updated 2 years ago
- How to prepare for OSCP complete guide☆129Updated 5 years ago
- This repository will contain all trainings and tutorials I have done/read to prepare for OSWE / AWAE.☆240Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Shell Please 1.0 : Reverse shell code generator.☆35Updated 2 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆213Updated 5 years ago
- AWS S3 Bucket/Object Finder☆119Updated 3 years ago