A curated collection of some cool Penetration scripts.
☆14Feb 25, 2021Updated 5 years ago
Alternatives and similar repositories for Awesome-Penetration-Scripts
Users that are interested in Awesome-Penetration-Scripts are comparing it to the libraries listed below
Sorting:
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- A collection of personal ZAP scripts☆13Apr 10, 2023Updated 2 years ago
- 🧿Join your two exe files☆11Jul 14, 2020Updated 5 years ago
- Dynamic and extensible shell code generator with multiple output types which can be formatted in binary, hexadecimal, and the typical she…☆19May 1, 2020Updated 5 years ago
- The Hall of Ancient Exploitation Tools☆16Oct 14, 2019Updated 6 years ago
- The script specializes in collecting information about sites, protocols and servers, facilitating work on the Metasploit project and repa…☆13Oct 31, 2018Updated 7 years ago
- Tool to find stored robots.txt files from the past☆19Jun 4, 2023Updated 2 years ago
- Change hash for a signed pe☆17Jul 18, 2023Updated 2 years ago
- A very weird RAT☆19Aug 11, 2022Updated 3 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- <?xml version="1.0" encoding="UTF-8"?> <!DOCTYPE html><html xmlns="http://www.w3.org/1999/xhtml" dir="ltr" lang="en" xml:lang="en" class=…☆10Jun 13, 2017Updated 8 years ago
- ☆16Jan 12, 2022Updated 4 years ago
- Automating the SQL Injection through Google dorks.☆26Sep 30, 2022Updated 3 years ago
- ☆23Nov 23, 2019Updated 6 years ago
- ☆10Sep 11, 2021Updated 4 years ago
- all manner of wordlists☆24Jan 19, 2022Updated 4 years ago
- Perl script to test the reliability of a list of open web proxies.☆31Jul 5, 2017Updated 8 years ago
- Recon Dog is an all in one tool for all your basic information gathering needs.☆11Mar 2, 2018Updated 8 years ago
- Osint Mass Mail Attack tool.☆31Jul 22, 2020Updated 5 years ago
- Red Team C2 and Post Exploitation code☆35Jul 8, 2025Updated 7 months ago
- HEVD Exploits for fun and learning.☆15Aug 30, 2025Updated 6 months ago
- BadUSB ile Penetrasyon☆13Jun 15, 2019Updated 6 years ago
- Cool stealer for Windwos. Cold wallet, VPN, Browsers, File, FileZila and etc Крутой стиллер для Windwos. Крипто кошельки, ВПН, Файлы с ра…☆15May 22, 2022Updated 3 years ago
- Scrape emails, phone numbers and social media accounts from a website. You can use the found information to gather more information or ju…☆15Dec 6, 2021Updated 4 years ago
- For accessing info of both public and private instagram accounts☆17Aug 29, 2022Updated 3 years ago
- ☆14Apr 29, 2021Updated 4 years ago
- A shellcode generator with encryption, encoding and polymorphism facilities built-in☆34May 16, 2022Updated 3 years ago
- API server for interacting with decentralised identity functionality on the cheqd Network☆11Updated this week
- Interact with standup reports and poll results directly from Claude or Cursor☆18Feb 25, 2026Updated last week
- The most powerful and fastest DoS Attack Tool☆12Dec 8, 2022Updated 3 years ago
- ☆14Jul 26, 2017Updated 8 years ago
- This is the public repo for Sentinel Group's Sentrix which is a Service on the Sentinel Service Chain and utilizes the Matrix Server to d…☆11Apr 30, 2018Updated 7 years ago
- https://github.com/DarkSecDevelopers/HiddenEye.git☆14Apr 27, 2020Updated 5 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- A tool which can perform advance recon automatically. Sit back and enjoy this tool work for you and find target's subdomains automaticall…☆11Sep 17, 2021Updated 4 years ago
- Toutatis transform for maltego☆51Jan 10, 2023Updated 3 years ago
- Command line pastebin for sharing terminal output.☆11Jul 29, 2021Updated 4 years ago
- ☆15Mar 17, 2022Updated 3 years ago
- Discover hidden information on the web with "Elite Google Dorks Search by Biscuit." This collection offers smart and improved Google sear…☆19Aug 10, 2025Updated 6 months ago