r0bag / pentest
☆44Updated 5 years ago
Alternatives and similar repositories for pentest:
Users that are interested in pentest are comparing it to the libraries listed below
- WPS scan and pwn tool☆66Updated 5 years ago
- Script to automate, manage, and multithread Nikto scans.☆59Updated 5 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- new WPS attack tool☆55Updated 9 years ago
- This tool extract domains from IP address based in the information saved in virustotal.☆24Updated 8 years ago
- collection of pentest tools☆24Updated 5 years ago
- An installation script to help with the setup of a Kali VM for The Hacker Playbook: Practical Guide To Penetration Testing by Peter Kim☆17Updated 9 years ago
- Your last stop for password list generation needs!☆27Updated 10 years ago
- Bash Bunny fun!☆52Updated 6 years ago
- Crowbar is brute forcing tool that can be used during penetration tests. It is developed to support protocols that are not currently supp…☆22Updated 4 years ago
- A shell script that automatically performs a series of *NIX enumeration tasks.☆40Updated 3 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 6 years ago
- Easy Window domain access☆51Updated 10 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- tools for analyzing strings from password lists☆58Updated 2 years ago
- A remote msfconsole written in Python 2.7 to connect to the msfrcpd server of metasploit. This tool gives you the ability to load modules…☆55Updated 6 years ago
- SSH User Enumeration Script in Python Using The Timing Attack☆92Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 9 years ago
- Windows Offline Common Password Hash Checker☆29Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- Plugin for keepnote to import a XML nmap file☆26Updated 8 years ago
- Specify targets and run sets of tools against them☆11Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆26Updated 5 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Scripts for running Responder.py in an Android (rooted) device.☆61Updated 8 years ago
- Payload generator that uses Metasploit and Veil. Takes IP address as input and calls Veil. Use msfvenom to create payloads and writes res…☆44Updated 5 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit