pry0cc / hackbox-pro
A git submodule list containing all the tools repo's you'll ever need.
☆28Updated 5 years ago
Alternatives and similar repositories for hackbox-pro:
Users that are interested in hackbox-pro are comparing it to the libraries listed below
- retrive metadata endpoint data with these one liners.☆37Updated 4 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆25Updated 5 years ago
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21Updated 7 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 4 years ago
- A subdomain reconnaissance scanner☆35Updated 2 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆23Updated 10 years ago
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Pivot into private VPC networks using a VPN connection☆41Updated 5 years ago
- This repo is dedicated to all my tricks, tweaks and modules for testing and hunting threats. This repo contains multiple directories whic…☆56Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆20Updated 6 years ago
- ☆25Updated 3 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated last year
- Clickjacking PoC Generator☆35Updated 4 years ago
- miscellaneous scripts mostly created for pentest purposes at first, but then for various IT tasks☆20Updated 2 months ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- A combined list of helpful awscli commands from Scott Piper's flaws.cloud exercise as well as from Beau Bullock's Breaching the Cloud Tra…☆19Updated 3 years ago
- Egressbuster is a method to check egress filtering and identify if ports are allowed. If they are, you can automatically spawn a shell.☆11Updated 6 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆41Updated 2 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 6 years ago
- List of Red Team Repositories☆17Updated 5 years ago
- C&C to deliver files and shuttle command execution instructions between an external actor and an internal agent with the help of Firefox …☆38Updated 2 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 6 years ago
- Scripts and tools for AWS Pentest☆51Updated 4 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- Directory/file & DNS busting tool written in Go☆14Updated 5 years ago
- Basic tool to automate backdooring PE files☆54Updated 2 years ago
- ☆34Updated last month