radicallyopensecurity / pentextLinks
PenText system: Easily create beautiful looking penetration test quotes, reports, and documents in many formats (PDF, text, JSON, CSV, ...)
☆126Updated 2 weeks ago
Alternatives and similar repositories for pentext
Users that are interested in pentext are comparing it to the libraries listed below
Sorting:
- A place to collect the different document templates for ROS☆62Updated 6 years ago
- Automatically exported from code.google.com/p/nipper-ng☆70Updated 2 years ago
- Scripts that we use for pentesting☆42Updated 8 years ago
- Easy links and guides for DEF CON 28 and 29☆57Updated 3 years ago
- Nmap enumeration and script scan automation script☆38Updated 2 years ago
- Scout - a Contactless Active Reconnaissance Tool☆53Updated 2 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- AWS S3 Bucket/Object Finder☆120Updated 3 years ago
- Manage all logistical information for a pentest including clients, contacts, employees, findings, projects, scoping, and vulnerabilities.☆42Updated last year
- Identify compromised domains or emails. A python based HIBP and HackedEmails wrapper☆38Updated 6 years ago
- ☆51Updated 2 years ago
- Learn you a book for some infosec good☆62Updated 5 years ago
- Professionally Evil Web Application Penetration Testing 101☆142Updated 5 years ago
- Brian's Pentesting and Technical Tips for You☆120Updated 10 months ago
- Taranis☆64Updated 4 years ago
- Vulnerability Management tool using the CVE-Search database☆10Updated 9 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆75Updated 3 years ago
- An auxiliary spellcheck dictionary that corresponds with the Bishop Fox Cybersecurity Style Guide☆86Updated 2 years ago
- Tool for quickly gathering information from Shodan.io about the number of IPs which satisfy large number of different queries☆49Updated 2 years ago
- Tools to measure the maturity of Enterprise Security Architecture processes☆13Updated 7 years ago
- Linux file read monitor☆90Updated last year
- Files vetted, and approved for public release☆53Updated last year
- Docker repository for OWTF (64-bit Kali)☆33Updated 5 years ago
- Acheron is a RESTful vulnerability assessment and management framework built around search and dedicated to terminal extensibility.☆32Updated 2 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Small and highly portable detection tests based on MITRE's ATT&CK.☆10Updated 4 months ago
- Command-line tool using Shodan API. Generates and downloads CSV results, diffing of historic scanning results, alerts and monitoring of s…☆66Updated 5 years ago
- SANS Slingshot Linux Distribution☆51Updated 4 years ago
- This tool can be used to enumerate the subdomains associated with a company by aggregating the results of multiple OSINT (Open Source Int…☆144Updated 2 years ago