The Penetration Testing Execution Standard (PTES) Automation Framework
☆77Mar 30, 2016Updated 9 years ago
Alternatives and similar repositories for ptes
Users that are interested in ptes are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Bash script to download all lecture videos & notes for a particular course on Coursera.org.☆13Dec 25, 2015Updated 10 years ago
- ☆10Jan 22, 2016Updated 10 years ago
- This is just an semi-automated fully working, no-bs, non-metasploit version of the public exploit code for MS17-010☆1,354Dec 24, 2023Updated 2 years ago
- ☆15Mar 2, 2014Updated 12 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Nov 21, 2014Updated 11 years ago
- Notes created for preparation of EJPTv2☆278Jan 18, 2023Updated 3 years ago
- Metasploit exploit suggester using OpenVAS XML output☆18Jun 30, 2018Updated 7 years ago
- ☆20May 18, 2022Updated 3 years ago
- JAWS - Just Another Windows (Enum) Script☆1,933Apr 19, 2021Updated 4 years ago
- Pentester's toolbox☆12Jan 21, 2026Updated 2 months ago
- 🦉🔬A small PowerShell tool for finding information quickly on malicious IPs or FQDNs. Powershell threat hunting.☆11Jan 9, 2020Updated 6 years ago
- ☆19Jan 14, 2026Updated 2 months ago
- ☆16Feb 6, 2024Updated 2 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Oracle WebLogic CVE-2022-21371☆19Aug 31, 2022Updated 3 years ago
- Defeating Windows User Account Control☆7,458Feb 17, 2026Updated last month
- Various notes I have compiled during the OSEP PEN-300 course.☆41Mar 16, 2025Updated last year
- Optimized WordLists for Pentesting☆16Feb 6, 2020Updated 6 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Jul 21, 2015Updated 10 years ago
- Use websockets with twisteds ProcessProtocol☆22Apr 11, 2016Updated 9 years ago
- The tool was created to assist with fuzzing and exploiting stack-based buffer overflows☆10Dec 29, 2020Updated 5 years ago
- On this repo you will find everythig to pass your Junior Penetration Tester Exam☆16Aug 29, 2023Updated 2 years ago
- Transform any binary file to a PNG image☆13Jul 19, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- The Shodan developer documentation covering the various APIs for Shodan, Exploits, Scanhub and anything else that's offered by Shodan.☆20Sep 16, 2013Updated 12 years ago
- A proof-of-concept to demonstrate randomized execution paths and their impact on call stack signatures — ideal for EDR testing, behavior-…☆24Jan 17, 2026Updated 2 months ago
- ☆11Aug 26, 2024Updated last year
- Library and tools to access the Windows Hibernation File (hiberfil.sys) format☆13Dec 20, 2025Updated 3 months ago
- Forensic Scanner☆41Nov 29, 2012Updated 13 years ago
- SubzzZ to find possible subdomains using passive recon. Tool also support Permutations, Mutations, Alterations.☆38Mar 7, 2021Updated 5 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Nov 12, 2014Updated 11 years ago
- Notes I took while preparing for eJPT certification by INE Security (passed 19/20, fka eLearn Security)☆156Nov 1, 2025Updated 4 months ago
- INE Training Notes☆59Apr 7, 2025Updated 11 months ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- Demonstrating the possibility of stealing the private data of Harvard students and professors <3☆11Dec 13, 2015Updated 10 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- SecurityTube Hack of the Day☆17Apr 2, 2013Updated 12 years ago
- Brutteforce for stego CTFs☆16Nov 2, 2022Updated 3 years ago
- Digital forensics for Google Drive—done right. Identify, preserve, and document cloud evidence with hash verification, timeline reconstru…☆26Dec 8, 2025Updated 3 months ago
- A ROP and binary analysis exploit challenge for edurange☆16Mar 4, 2015Updated 11 years ago
- Python Nessus Library - libnessus is a python library to enable devs to chat with nessus XMLRPC API, parse, store and diff scan results. …☆24Feb 10, 2023Updated 3 years ago