pry0cc / hackbox-pro
A git submodule list containing all the tools repo's you'll ever need.
☆28Updated 5 years ago
Related projects: ⓘ
- retrive metadata endpoint data with these one liners.☆37Updated 4 years ago
- ☆24Updated this week
- ☆27Updated this week
- A dockerized, improved version of the Impacket smbserver.py☆38Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- The Shodan monitoring tools allows you to monitor shodan listed servers basis on the filter you provided☆33Updated 3 years ago
- ☆23Updated this week
- Docker Version of Aquatone☆13Updated 6 years ago
- ☆27Updated this week
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Docker auditing and enumeration script.☆22Updated 4 years ago
- A collection of scripts for the purpose of gathering open source intelligence, to be presented at GrayHat, BSides Denver, and Information…☆24Updated 3 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆35Updated last year
- automated penetration toolkit☆12Updated 8 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆71Updated 4 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 6 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆22Updated 10 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- Ansible scripts to build an attack box☆22Updated 5 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- Bash Enumeration Script☆18Updated 4 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 5 years ago
- A password spraying wordlist generator. Takes breach data as a valid input in order to target password reuse.☆44Updated 5 years ago
- Gunslinger is used to hunt for Magecart sites using URLScan's API☆30Updated 2 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- Security checks for your researches☆33Updated 3 years ago
- Pivot into private VPC networks using a VPN connection☆40Updated 4 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated last year