☆43Oct 15, 2019Updated 6 years ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- WPS Locked Intrusion Script for Kali Linux 2.0 and 2016☆38Jan 12, 2018Updated 8 years ago
- Refluxion -- MITM WPA attacks tool☆40Jul 18, 2020Updated 5 years ago
- A Burp Extender plugin, that will make binary soap objects readable and modifiable.☆29Feb 21, 2022Updated 4 years ago
- ☆15Sep 24, 2015Updated 10 years ago
- little scripts created during my time as a pentetration tester☆31Jun 17, 2012Updated 13 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Veil-Evasion is a tool used to generate payloads that bypass antivirus solutions☆12Apr 24, 2017Updated 9 years ago
- WPS hacking scripts☆287Feb 21, 2024Updated 2 years ago
- Public Exploits☆10Apr 6, 2021Updated 5 years ago
- A keylogger - with lazy implementation - that sends logs through Gmail's SMTP.☆12Oct 10, 2015Updated 10 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Mar 7, 2023Updated 3 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Oct 29, 2017Updated 8 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- ☆56Jul 20, 2017Updated 8 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Download contents from radiocut.fm☆20Aug 30, 2019Updated 6 years ago
- Vulnerabilities, security advisories, exploit codes and proof-of-concept codes.☆10Apr 12, 2026Updated 3 weeks ago
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- Xss Vulnerability Demonstration framework.☆12Aug 22, 2013Updated 12 years ago
- Set of useful scrpts☆10Jan 4, 2015Updated 11 years ago
- WinHTTP wrapper and logger☆11Apr 28, 2015Updated 11 years ago
- Fortigate Log Parser☆16Dec 28, 2025Updated 4 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Tool for check the cookie flag in multiple sites☆28Dec 30, 2015Updated 10 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 9 months ago
- A PowerShell binding for the Unicorn Engine☆17Dec 27, 2015Updated 10 years ago
- Interactive python script for exploiting WPS on access points. Works well with Kali 2.0. (Disclaimer: I'm not responsible for any illeg…☆10Sep 25, 2016Updated 9 years ago
- ☆36Feb 18, 2013Updated 13 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- # This scripts is edited under the General Public License as defined by the Free software foundation. # This package is distributed in …☆65Dec 14, 2023Updated 2 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 4 years ago
- Disconnects client from router☆14Jul 28, 2017Updated 8 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- PowerShell Empire module for logging USB keystrokes via ETW☆31Nov 11, 2016Updated 9 years ago
- Automatic Multi-target WPS Pin Harvester☆29May 5, 2018Updated 8 years ago
- Single hashcat rule file containing all possible rules.☆10Oct 20, 2015Updated 10 years ago
- ☆574Oct 10, 2023Updated 2 years ago
- Pentesters spend too much time during information gathering phase. Flashlight (Fener) provides services to scan network/ports and gather …☆194Jun 23, 2019Updated 6 years ago
- Simple network sandbox for Unix and Windows☆20Jan 28, 2019Updated 7 years ago
- Self contained htaccess shells and attacks☆16May 18, 2018Updated 7 years ago