rbsec / pentestLinks
Various pentest stuff
☆24Updated 8 months ago
Alternatives and similar repositories for pentest
Users that are interested in pentest are comparing it to the libraries listed below
Sorting:
- Docker container to run Loki : Loki is a python based infrastructure pentesting tool focussing on layer 3 protocols.☆43Updated 3 weeks ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆73Updated last year
- Néphélées (Νεφήλαι, Nephḗlai) : cloud nymphs greek - also NTDS cracking tool on Google Cloud☆35Updated 4 years ago
- A cheat sheet that contains the most OpenSSL commands used by Dev, SysAdmin in real life.☆62Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- recon-ng modules for Censys☆38Updated 2 years ago
- A web front-end for password cracking and analytics☆16Updated 6 years ago
- Miscellaneous tools for BloodHound☆18Updated 3 years ago
- NSE script which leverages the Censys Search API for passive data collection☆58Updated 3 years ago
- Guidelines for writing secure code for Python developers.☆21Updated 8 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆54Updated 9 months ago
- WordPress version identification and vulnerability finder.☆31Updated 3 years ago
- Import, visualize, and analyze SpiderFoot scans in Neo4j, a graph database☆79Updated 2 years ago
- A WLAN red team framework.☆155Updated last year
- A tool to run nmap against each line in a script.☆17Updated 4 years ago
- Extract credentials and other useful info from network captures☆74Updated 3 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆22Updated 3 years ago
- Simple Phishing Toolkit is a super easy to install and use phishing framework built to help Information Security professionals find human…☆29Updated 7 years ago
- an OSINT tool to scrape sub domains from the Virus Total API☆24Updated 2 years ago
- How to utilize tools such as Fail2ban and PortSentry to detect and block people that try to scan your Kali Linux machine for open ports o…☆85Updated 4 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Updated 3 years ago
- Unpacked tools of CQAcademy☆110Updated 6 years ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- EnumVolcano is an open source Bash script which is used to perform automated enumeration for privilege escalation. This tool is dedicated…☆25Updated 3 years ago
- Staged Payloads from Kali Linux - Part 1,2 of 3☆20Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- WebHook for Red Team☆26Updated 4 years ago
- https://github.com/yeyintminthuhtut/Awesome-Red-Teaming☆17Updated 3 years ago