radicallyopensecurity / pentextLinks
PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ...)
☆129Updated last week
Alternatives and similar repositories for pentext
Users that are interested in pentext are comparing it to the libraries listed below
Sorting:
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆77Updated this week
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 3 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆87Updated 2 years ago
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- AWS S3 Bucket/Object Finder☆122Updated 4 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Collection of useful scripts.☆78Updated 3 years ago
- Various XSL templates to manipulate data from NMap XML reports☆27Updated 6 years ago
- Security tools report parsers for Faradaysec.com☆54Updated last week
- Amazon bucket brute force tool☆102Updated 12 years ago
- pentest-standard.org docs redesign☆47Updated 3 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 4 years ago
- Test a network's egress controls with various levels of success and failure.☆104Updated 3 years ago
- Guesses hash types, picks some sensible dictionaries and rules for hashcat☆99Updated last year
- The aim of Wordsmith is to assist with creating tailored wordlists. This is mostly based on geolocation.☆170Updated 7 years ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 6 years ago
- A jupyter notebook that contains the main commands executed during a penetration test☆74Updated 5 years ago
- Monitoring GitHub for sensitive data shared publicly☆65Updated 3 years ago
- A collection of response templates for invalid bug bounty reports.☆90Updated 7 years ago
- Test a host for susceptibility to CVE-2019-19781☆109Updated 4 years ago
- Automated daily scan using Nmap and report on the differences☆92Updated 7 years ago
- SANS Slingshot Linux Distribution☆53Updated 4 years ago
- ☆114Updated 4 months ago
- A lab to play with authentication and authorisation problems☆97Updated 2 years ago