peass-ng / BotPEASS
Use this bot to monitor new CVEs containing defined keywords and send alerts to Slack and/or Telegram.
☆219Updated this week
Related projects: ⓘ
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆145Updated this week
- Shodan Dorks 2023☆229Updated last year
- Simple HTTP listener for security testing☆112Updated 11 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆145Updated 8 months ago
- Red Team Attack Lab for TTP testing & research☆543Updated last year
- Nuclei templates for honeypots detection.☆185Updated 10 months ago
- Tool for hiding Kali Linux on the network☆295Updated 3 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆227Updated 2 weeks ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆174Updated last month
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆187Updated 2 weeks ago
- A RedTeam Toolkit☆377Updated 7 months ago
- This repository contains cutting-edge open-source security notes and tools that will help you during your Red Team assessments.☆175Updated 2 weeks ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆187Updated 2 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆342Updated 9 months ago
- ☆88Updated 9 months ago
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆312Updated 9 months ago
- Pentesting automation platform that combines hacking tools to complete assessments☆423Updated last week
- ☆426Updated this week
- Script for generating revshells☆451Updated last week
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆140Updated 4 months ago
- Active Directory Wordlists☆84Updated 4 years ago
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆291Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- Shodan Dorks☆176Updated 3 weeks ago
- My public notes about offensive security☆144Updated 8 months ago
- Amnesiac is a post-exploitation framework entirely written in PowerShell and designed to assist with lateral movement within Active Direc…☆322Updated last week
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆81Updated last year
- Red Team Guides☆134Updated 8 months ago