pentestgeek / scripts
A collection of useful scripts for penetration testers
☆82Updated 12 years ago
Alternatives and similar repositories for scripts:
Users that are interested in scripts are comparing it to the libraries listed below
- A collection of scripts that I've written while pentesting.☆31Updated 6 years ago
- ☆61Updated 6 years ago
- Metasploit Framework☆26Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 5 years ago
- ☆63Updated 12 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆25Updated 8 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 2 years ago
- Some simple and useful tools☆15Updated 6 years ago
- a collection of useful scripts that for penetration testers☆34Updated 3 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 7 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 7 years ago
- Web Filter External Enumeration Tool (WebFEET)☆75Updated 10 years ago
- PortPlow is a distributed port and system scanning & enumeration service. It enables the quick and automated enumeration of ports and ser…☆53Updated 3 months ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆68Updated 7 years ago
- A python script to query the MITRE ATT&CK API for tactics, techniques, mitigations, & detection methods for specific threat groups.☆66Updated 6 years ago
- Automated enumeration☆30Updated 3 years ago
- Subdomain brute force focused on speed and data serialization☆75Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- DNS Enumeration and Reconnaissance Tool☆37Updated 9 years ago
- Query Active Directory for Workstations and then pull their Wireless Network Passwords☆46Updated 7 years ago
- Search drives for documents containing passwords☆63Updated 10 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- ☆25Updated 8 years ago
- tools for analyzing strings from password lists☆57Updated 2 years ago