pentest-standard / docsLinks
pentest-standard.org docs redesign
☆46Updated 3 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Parse .nessus file(s) and shows output in interactive UI☆161Updated this week
- Pentesting/Bugbounty Dockerfiles.☆176Updated 4 years ago
- NessusV2 File Parser☆68Updated 3 years ago
- Active Directory Lab for Penetration Testing☆52Updated 5 months ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆148Updated 5 years ago
- PatrowlHears - Vulnerability Intelligence Center / Exploits☆165Updated last week
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- 👹☆57Updated 4 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 8 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 7 months ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 4 years ago
- Converts Nmap XML output to csv file, and other useful functions☆94Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆134Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆146Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆48Updated 10 years ago
- Docs: Vulnerability management aggregation of AppSec & OpSec (Tools Listing)☆31Updated 2 years ago
- A Python script to collect campaign data from Gophish and generate a report☆198Updated 3 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago
- A Linux enumeration script for Hack The Box☆191Updated 6 years ago
- Disposable and resilient red team infrastructure with Terraform☆280Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago
- Hashes for vulnerable LOG4J versions☆156Updated 4 years ago
- ☆159Updated 8 years ago
- Fast offline auditing of Active Directory passwords using Python.☆165Updated last year
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆109Updated 2 years ago
- Local privilege escalation, or remote code execution, through Splunk Universal Forwarder (UF) misconfigurations☆255Updated 3 years ago
- This reconissance tool is specific written for OSCP engagements.☆55Updated 2 years ago
- GUI tool which enables you to parse nessus scan files from Nessus and Tenable.SC by (C) Tenable, Inc. and exports results to a spreadshee…☆107Updated 2 months ago
- A collection of my Dockerfiles☆90Updated 3 years ago