pentestmonkey / pysecdumpLinks
Python-based tool to dump security information from Windows systems
☆275Updated 5 years ago
Alternatives and similar repositories for pysecdump
Users that are interested in pysecdump are comparing it to the libraries listed below
Sorting:
- CTF Challenges☆133Updated 10 months ago
- Challenges source code☆64Updated 7 years ago
- Challenge source code, handout scripts and writeups of BSides Delhi CTF☆72Updated 6 years ago
- Repository to index useful online tools for CTF☆165Updated 9 months ago
- A ton of helpful tools☆339Updated 4 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆506Updated 7 years ago
- Post Exploitation Wiki☆523Updated 5 years ago
- Cross-site scripting labs for web application security enthusiasts☆320Updated 4 years ago
- Network reconnaissance and vulnerability assessment tools.☆402Updated 3 years ago
- Github for the scripts utilised during Penetration test☆235Updated 8 years ago
- Penetration testing scripts☆145Updated 7 years ago
- Scripts that are useful for me on pen tests☆533Updated 3 years ago
- Database of websites for penetration testing☆177Updated 5 years ago
- Plugins for Metasploit Framework☆468Updated 6 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- Collection of different exploits☆182Updated 4 years ago
- Cheat sheet and notes inspired by the book RTFM - Red Team Field Manual☆187Updated last year
- swiss army knife for hackers☆535Updated 2 years ago
- A unified console to perform the "kill chain" stages of attacks.☆206Updated 2 years ago
- Automates some pentest jobs via nmap xml file☆322Updated 7 years ago
- One of the biggest annoyances of using Recon-ng is getting everything set up to use it. So here I’ll outline the different API keys it c…☆162Updated 7 years ago
- Write-ups and Source-codes for CTF Challenges☆67Updated last year
- Collection of social engineering payloads☆299Updated 8 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆208Updated last year
- Personal Collection of Operating Systems Scripts☆563Updated last year
- A tool to find and exploit servers vulnerable to Shellshock☆330Updated 2 years ago
- Framework for Man-In-The-Middle attacks☆189Updated 8 years ago
- MeterSSH is a way to take shellcode, inject it into memory then tunnel whatever port you want to over SSH to mask any type of communicati…☆524Updated 8 years ago
- Reverse shell generator written in Python 3.☆538Updated 2 months ago
- Red Team Tactics, Techniques, and Procedures☆417Updated 3 weeks ago