pentestmonkey / pysecdump
Python-based tool to dump security information from Windows systems
☆266Updated 4 years ago
Alternatives and similar repositories for pysecdump:
Users that are interested in pysecdump are comparing it to the libraries listed below
- CTF Challenges☆125Updated 2 months ago
- A ton of helpful tools☆336Updated 3 years ago
- Repository to index useful online tools for CTF☆155Updated 2 weeks ago
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆65Updated 5 years ago
- Post Exploitation Wiki☆515Updated 5 years ago
- Challenges source code☆61Updated 7 years ago
- Cross-site scripting labs for web application security enthusiasts☆306Updated 3 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆572Updated 8 months ago
- Scripts that are useful for me on pen tests☆527Updated 2 years ago
- Custom Tools and Notes from my own Penetration Testing Experience☆274Updated last year
- Plugins for Metasploit Framework☆442Updated 6 years ago
- Windows Pentest Scripts☆230Updated 7 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆505Updated 6 years ago
- Write-ups and Source-codes for CTF Challenges☆58Updated 3 months ago
- Tool to identify routers on the local LAN and paths to the Internet☆203Updated last year
- Network reconnaissance and vulnerability assessment tools.☆398Updated 3 years ago
- Collection of different exploits☆182Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- SQL injection challenge☆93Updated 8 years ago
- Tricks for penetration testing☆571Updated 4 years ago
- Frontpage and Sharepoint fingerprinting and attack tool.☆282Updated 3 years ago
- RSA primes numbers /RSA/CTFs☆71Updated last year
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆160Updated 7 years ago
- locate and attack Lync/Skype for Business☆335Updated 4 months ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- Veil-Pillage is a post-exploitation framework that integrates with Veil-Evasion.☆157Updated 9 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆365Updated 6 months ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆559Updated 9 months ago
- Just a collection of pentest stuffs☆95Updated 5 years ago