Virtual scenario for Network Penetration Testing
☆14Mar 19, 2017Updated 8 years ago
Alternatives and similar repositories for Penetration-Testing
Users that are interested in Penetration-Testing are comparing it to the libraries listed below
Sorting:
- Kal El Network Stress Test and Penetration Testing Toolkit☆54Mar 11, 2024Updated last year
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- Tool for test XSS vulnerabilities of a site☆18Apr 1, 2018Updated 7 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- References for FIRST CTI 2019 Symposium presentation☆23Mar 19, 2019Updated 6 years ago
- Easy Fast recon script☆30Sep 15, 2019Updated 6 years ago
- ☆34May 4, 2020Updated 5 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- Jok3r v3 BETA 2 - Network and Web Pentest Automation Framework☆1,073Jun 7, 2024Updated last year
- Script to import ProtonVPN configuration files into NetworkManager automatically☆10Feb 6, 2020Updated 6 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- Daniel Dib's answers to Kirk Byers Python for Network Engineers Course Exercises☆10Mar 16, 2017Updated 8 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- A List Of Labs For People (Students) Who Want Learn OR Practice IT Security / Hacking / Penetration Testing In Ethical Way.☆90Nov 25, 2020Updated 5 years ago
- Set up your own BurpSuite☆37Oct 29, 2018Updated 7 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- My logstash plugins. Filter: sig (for security detect -> IOC, sig, New value, Reference, link, frequence, ...). Output: alert created by …☆10Jul 26, 2019Updated 6 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Sophos Deobfuscation Tool. Deobfuscates passwords obfuscated with Sophos Obfuscation Tool.☆18Jan 29, 2018Updated 8 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- That's an IP ping monitor program it exports Up / Down results to excel (.xls) and send e-mail notifications to admins☆11Aug 30, 2018Updated 7 years ago
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- ☆10Apr 18, 2019Updated 6 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Microservices eCommerce Application with django and vue.js running on docker☆13Dec 23, 2022Updated 3 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- ☆12Sep 23, 2023Updated 2 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago
- Annotate IDA with source and line number information from a PDB☆15Apr 15, 2021Updated 4 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- Public Github Pages for Cisco☆14Oct 16, 2018Updated 7 years ago
- ☆12Oct 31, 2021Updated 4 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago