Sample list of penetration test reports
☆17Dec 12, 2016Updated 9 years ago
Alternatives and similar repositories for pentesting-reports
Users that are interested in pentesting-reports are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collect SIEM logs from the Mimecast API using Python. Currently supports multiple endpoints. Use this to be able to easily and quickly fo…☆11Apr 4, 2024Updated last year
- Command-line client to interact with Hack The Box☆16Apr 9, 2020Updated 5 years ago
- Burp extension to find and decode BigIP and Netscaler cookies☆15Jul 20, 2018Updated 7 years ago
- Collection of Jupyter notebooks☆14Mar 11, 2021Updated 5 years ago
- Fuzzer for finding Open Mail Relays☆14Oct 21, 2020Updated 5 years ago
- Pentesting, Red Teaming. Reports☆11May 25, 2023Updated 2 years ago
- Python module to interact with THOR Thunderstorm service☆17Dec 5, 2025Updated 3 months ago
- -notes and scripts for online course OffIOT☆12Jan 19, 2026Updated 2 months ago
- ☆10Oct 9, 2024Updated last year
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆19Mar 26, 2019Updated 6 years ago
- A suggested path for learning Vim's scripting language, VimL☆21Jun 14, 2014Updated 11 years ago
- Collection of notes for talks☆13Jan 6, 2024Updated 2 years ago
- Base LaTeX template for a penetration test report.☆41Mar 7, 2022Updated 4 years ago
- Golang implementation of PyMISP-feedgenerator☆18Jul 31, 2022Updated 3 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- "Nobody ever figures out what life is all about, and it doesn't matter. Explore the world. Nearly everything is really interesting if you…☆13Feb 26, 2021Updated 5 years ago
- Latex template based on the typographic memoir class for formatting PhD dissertations. Suitable for any areas but devised for computer sc…☆18May 14, 2012Updated 13 years ago
- Bruteforce with a stream of permutations of a specific pattern☆26Aug 6, 2025Updated 7 months ago
- pathogen bundle of DrawIt plugin by DrChip☆11Sep 20, 2016Updated 9 years ago
- FARO - Document Sensitivity Detector☆11Feb 8, 2021Updated 5 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Dec 5, 2018Updated 7 years ago
- Reflective DLL that hooks the creation of the UAC prompt popped by explorer.exe for privilege escalation.☆22Feb 20, 2021Updated 5 years ago
- Simple SYSLOG client in Go☆22Jun 5, 2025Updated 9 months ago
- Basic Binary Exploitation / Buffer Overflows☆11Jun 11, 2017Updated 8 years ago
- Workshop dictado para Chicas Programando - Noviembre 2019☆10Nov 24, 2019Updated 6 years ago
- Reproducing the SkeletonKey malware.☆11Apr 6, 2024Updated last year
- Prototype of the HealthOS ventilation system☆14Mar 27, 2020Updated 5 years ago
- Script for tracking file system changes☆19Jan 23, 2018Updated 8 years ago
- Forked and updated with some additional features over the original☆17Mar 30, 2021Updated 4 years ago
- GUI program to generate windows and SQL audit files for nessus☆14Jun 23, 2017Updated 8 years ago
- Small and highly portable detection tests.☆12Oct 12, 2017Updated 8 years ago
- Python script to patch the reflective stub in a DLL☆24Apr 9, 2017Updated 8 years ago
- pentestscripts☆16Sep 16, 2019Updated 6 years ago
- Post-explotation Hacks☆14Jan 6, 2019Updated 7 years ago
- Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.☆12Feb 21, 2025Updated last year
- Golang code to crawl website, extract links from html, paths from JavaScript code, follow and repeat.☆12Jun 4, 2018Updated 7 years ago
- ☆10Jul 22, 2022Updated 3 years ago
- YARA Rule Strings Statistics Calculator and Malware Research Helper☆14Jul 24, 2021Updated 4 years ago
- "Few is the number of those who think with their own mind and feel with their own heart."― Albert Einstein☆15Feb 26, 2021Updated 5 years ago