Virtual scenario for Network Penetration Testing
☆14Mar 19, 2017Updated 9 years ago
Alternatives and similar repositories for Penetration-Testing
Users that are interested in Penetration-Testing are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated 2 years ago
- Alert when a issuer, or domain changes for a signed certificate☆13Dec 8, 2022Updated 3 years ago
- Frontend repository for COVID-19 self-reporting tool in React☆10Aug 2, 2021Updated 4 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,077Jun 7, 2024Updated last year
- A collection of common web programming security mistakes.☆16Jun 11, 2019Updated 6 years ago
- Hacking Toolkit☆973Dec 30, 2025Updated 2 months ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 7 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Tool for Active Directory Certificate Services enumeration and abuse☆13Oct 7, 2024Updated last year
- ☆34May 4, 2020Updated 5 years ago
- A place to store my own wordlists, and link to others that are useful☆108Nov 15, 2023Updated 2 years ago
- Still in dev mode☆12Apr 24, 2018Updated 7 years ago
- Set up your own BurpSuite☆37Oct 29, 2018Updated 7 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- ☆14May 30, 2018Updated 7 years ago
- Annotate IDA with source and line number information from a PDB☆15Apr 15, 2021Updated 4 years ago
- Burp Bounty Lab provides a safe, local target to validate that your Burp Bounty Pro scanner profiles detect vulnerabilities correctly. It…☆40Mar 16, 2026Updated last week
- CherryTree OSCP methodology template☆15Dec 10, 2018Updated 7 years ago
- Automatically exported from code.google.com/p/burp-extensions☆10Feb 18, 2020Updated 6 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆90Nov 25, 2020Updated 5 years ago
- Sample code material for BoF exploit training☆10May 12, 2020Updated 5 years ago
- Dashboard containing various recon tools☆14Oct 12, 2017Updated 8 years ago
- Ghazi is a BurpSuite Plugins For Testing various PayLoads Like "XSS,SQLi,SSTI,SSRF,RCE and LFI" through Different tabs , Where Each Tab W…☆107Feb 11, 2019Updated 7 years ago
- Easy Fast recon script☆30Sep 15, 2019Updated 6 years ago
- OS Lockdown☆13Nov 21, 2017Updated 8 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Code repository for Tutsplus course PHP Security Pitfalls☆38Jul 24, 2013Updated 12 years ago
- Some talks about security☆12Nov 20, 2020Updated 5 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- Script to import ProtonVPN configuration files into NetworkManager automatically☆10Feb 6, 2020Updated 6 years ago
- 常规漏洞+逻辑漏洞+配置漏洞+漏洞分析☆10Nov 29, 2019Updated 6 years ago
- ☆12Oct 31, 2021Updated 4 years ago
- Proof of concept VBA code to add to Normal.dot to put restrictions on Word☆40Dec 20, 2016Updated 9 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year