obheda12 / JupyterPenLinks
A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks
☆147Updated 4 years ago
Alternatives and similar repositories for JupyterPen
Users that are interested in JupyterPen are comparing it to the libraries listed below
Sorting:
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- ☆71Updated 4 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆122Updated 3 years ago
- Ugly Duckling is a lightweight scanner built specifically for our Crowdsource community to submit proof-of-concept modules☆188Updated 3 years ago
- Weaponizing Live CT logs for automated monitoring of assets☆135Updated 4 years ago
- ASN reconnaissance script☆131Updated last year
- ☆28Updated 6 years ago
- ☆51Updated 3 years ago
- Parse .nessus file(s) and shows output in interactive UI☆157Updated 4 months ago
- A set of recipes useful in pentesting and red teaming scenarios☆144Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Just a repo of random Python scripts to get pentesters started with the Python language on engagements.☆217Updated 5 years ago
- Sharing Various Things☆22Updated 3 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- m0chan.github.io☆87Updated 2 weeks ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆215Updated 5 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆105Updated 2 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- A list of "secrets" from JWT sample code and readme files.☆55Updated 4 years ago
- Repo of useful scripts☆105Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆107Updated last year
- NessusV2 File Parser☆65Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆91Updated 2 years ago
- Suite of programs meant to aid in bug hunting and security assessments☆77Updated 5 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.☆42Updated 5 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 2 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago