radicallyopensecurity / pentextLinks
PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ...)
☆132Updated 4 months ago
Alternatives and similar repositories for pentext
Users that are interested in pentext are comparing it to the libraries listed below
Sorting:
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆82Updated 4 months ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆94Updated 2 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆142Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- AWS S3 Bucket/Object Finder☆123Updated 4 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 4 years ago
- Automatically exported from code.google.com/p/nipper-ng☆73Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 5 years ago
- Scout - a Contactless Active Reconnaissance Tool☆56Updated 3 years ago
- Just a collection of pentest stuffs☆94Updated 6 years ago
- A place to collect the different document templates for ROS☆62Updated 7 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- SANS Slingshot Linux Distribution☆56Updated 5 years ago
- Various XSL templates to manipulate data from NMap XML reports☆27Updated 7 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- Collection of useful scripts.☆79Updated 3 years ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆73Updated 5 years ago
- ☆117Updated 8 months ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆66Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- A static website template for security pages.☆54Updated 6 months ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆34Updated 3 years ago
- ☆21Updated 2 years ago
- A tool to enumerate S3 buckets manually or via certstream☆82Updated 2 years ago
- Monitoring GitHub for sensitive data shared publicly☆66Updated 4 years ago
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- #legalbugbounty project — creating safe harbors on bug bounty programs and vulnerability disclosure programs. Authored by Amit Elazari.☆73Updated 6 years ago
- ☆51Updated 3 years ago
- The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.☆49Updated 6 years ago