radicallyopensecurity / pentextLinks
PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ...)
☆127Updated 2 months ago
Alternatives and similar repositories for pentext
Users that are interested in pentext are comparing it to the libraries listed below
Sorting:
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- Amazon bucket brute force tool☆102Updated 12 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- A cloud-backed password cracking and assessment tool - Sponsored by Open Security☆69Updated 2 years ago
- ☆51Updated 3 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- AWS S3 Bucket/Object Finder☆120Updated 4 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- Lure - User Recon Automation for GoPhish☆167Updated 2 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated last year
- ☆115Updated 2 months ago
- A jupyter notebook that contains the main commands executed during a penetration test☆74Updated 4 years ago
- NebulousAD automated credential auditing tool.☆154Updated 5 years ago
- NSE script which leverages the Censys Search API for passive data collection☆60Updated 3 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Manage all logistical information for a pentest including clients, contacts, employees, findings, projects, scoping, and vulnerabilities.☆42Updated last year
- List of default passwords for Industrial Control Systems☆75Updated 8 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Updated 3 years ago