pentest-standard / docsLinks
pentest-standard.org docs redesign
☆47Updated 3 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Parse .nessus file(s) and shows output in interactive UI☆159Updated 5 months ago
- NessusV2 File Parser☆66Updated 3 years ago
- A Linux enumeration script for Hack The Box☆190Updated 5 years ago
- 👹☆56Updated 4 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Active Directory Lab for Penetration Testing☆52Updated 3 months ago
- ☆156Updated 8 years ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- ☆81Updated 3 years ago
- Converts Nmap XML output to csv file, and other useful functions☆92Updated 2 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- Used to check for TCP and UDP egress filtering on both windows and unix client systems☆146Updated 4 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- A collection of my Dockerfiles☆90Updated 2 years ago
- Disposable and resilient red team infrastructure with Terraform☆277Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆114Updated 4 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- The Pixi module is a MEAN Stack web app with wildly insecure APIs!☆132Updated 2 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A Python script to collect campaign data from Gophish and generate a report☆198Updated 2 years ago
- My OSCP notes☆223Updated last year
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26Updated 5 years ago
- ☆99Updated 8 months ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆70Updated 5 months ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆148Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- Hashes for vulnerable LOG4J versions☆155Updated 3 years ago
- Password decryption tool for the McAfee SiteList.xml file☆154Updated last year