pentest-standard / docsLinks
pentest-standard.org docs redesign
☆47Updated 3 years ago
Alternatives and similar repositories for docs
Users that are interested in docs are comparing it to the libraries listed below
Sorting:
- Parse .nessus file(s) and shows output in interactive UI☆157Updated 4 months ago
- NessusV2 File Parser☆65Updated 3 years ago
- A Python script to collect campaign data from Gophish and generate a report☆197Updated 2 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- Active Directory Lab for Penetration Testing☆52Updated 2 months ago
- 👹☆56Updated 4 years ago
- Passive internal reconnaissance tool☆72Updated 2 years ago
- Script to export Nessus results to a relational database for use in reports, analysis, or whatever else.☆69Updated 5 months ago
- …(⊙_⊙;)…☆56Updated 4 years ago
- ☆44Updated last year
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- Disposable and resilient red team infrastructure with Terraform☆275Updated 6 years ago
- A detailed guide showing you different ways you can incorporate Python into your workflows around Nmap.☆150Updated 3 years ago
- A collection of my Dockerfiles☆90Updated 2 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- ☆81Updated 3 years ago
- Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)☆79Updated 3 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆106Updated last year
- ☆155Updated 8 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆253Updated 2 months ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆100Updated last year
- Phishing Simulation mainly aims to increase phishing awareness by providing an intuitive tutorial and customized assessment☆144Updated 3 years ago
- A step-by-step walkthrough of CloudGoat 2.0 scenarios.☆135Updated 5 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooks☆147Updated 4 years ago
- Where I'll be posting my scripts, guides, cheatsheets, and notes for for my OSCP journey.☆34Updated 7 years ago
- Converts Nmap XML output to csv file, and other useful functions☆91Updated 2 years ago
- Username guessing tool primarily for use against the default Solaris finger service. Also supports relaying of queries through another fi…☆47Updated 10 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- scavenger : is a multi-threaded post-exploitation scanning tool for scavenging systems, finding most frequently used files and folders a…☆338Updated 6 years ago