A collection of tools for every PENTEST engagement
☆12Oct 21, 2019Updated 6 years ago
Alternatives and similar repositories for Weaponry
Users that are interested in Weaponry are comparing it to the libraries listed below
Sorting:
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Sep 24, 2012Updated 13 years ago
- !!! Deprecated See ESP-RFID-Thief !!! Original PoC(Released: Sep 11, 2016) - This is a port/remix of the Tastic RFID Thief to the Adafrui…☆26Jan 18, 2017Updated 9 years ago
- A CLI tool for leveraging IDP signing keys to impersonate users and groups☆19Apr 1, 2021Updated 4 years ago
- This cheatsheet maps common impacket workflows to their modern alternatives☆56Updated this week
- ☆15Apr 27, 2020Updated 5 years ago
- CATPHISH project - For phishing and corporate espionage. Perfect for RED TEAM.☆629Oct 16, 2018Updated 7 years ago
- Social Toolkit for Phishing Attacks (Cross-Plataform)☆21Sep 26, 2016Updated 9 years ago
- Metasploit Framework☆10Apr 3, 2017Updated 8 years ago
- ☆12Mar 10, 2026Updated last week
- Web shells for PHP/ASP/ASP.NET using the least number of characters☆14Sep 27, 2023Updated 2 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Username lists that I created.☆17Aug 9, 2021Updated 4 years ago
- Snippets of scripting randomness☆13Jun 9, 2022Updated 3 years ago
- ☆14Jan 19, 2022Updated 4 years ago
- Docker auditing and enumeration script.☆22Oct 7, 2019Updated 6 years ago
- Modified proxmark3 firmware to perform brute forcing of 26-Bit ProxCards☆12Sep 26, 2016Updated 9 years ago
- A fork of David B Heise's VirusTotal Powershell Module☆17Mar 14, 2022Updated 4 years ago
- This extension allows a user to specify a lockout policy in order to automate a password spray attack via Intruder.☆25Apr 1, 2020Updated 5 years ago
- SMF2WPBridge is a simple one way bridge from Simple Machine Forum to Wordpress.☆12Apr 10, 2020Updated 5 years ago
- A simple apache logs analyzer.☆18Oct 1, 2017Updated 8 years ago
- ☆20Jan 18, 2024Updated 2 years ago
- Python OSINT Tool to retrieve pictures from a specific location using Instagram API☆36Jun 28, 2015Updated 10 years ago
- Wordpress.org svn repositories spider☆12Aug 4, 2014Updated 11 years ago
- Script to change all MAC Addresses☆12Oct 3, 2013Updated 12 years ago
- 👨🏼💻 Brute force wifi passwords with AppleScript.☆14Jan 7, 2020Updated 6 years ago
- I created my own Keylogger I am going to open source its code .But no one is allowed to use it commercially and I have actual copy right…☆11Sep 30, 2017Updated 8 years ago
- Download and Inject code into Google Chrome extensions☆13Nov 16, 2017Updated 8 years ago
- threejs risk-based heatmap☆12Aug 1, 2023Updated 2 years ago
- A simple dnsmasq web gui.☆17Jul 17, 2023Updated 2 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆97Jul 9, 2020Updated 5 years ago
- Payloads for the Hak5 Bash Bunny☆11Apr 2, 2017Updated 8 years ago
- adrw's dotfiles☆14Mar 12, 2026Updated last week
- An email client in CLI, designed specifically for spearphishing.☆13Jul 25, 2019Updated 6 years ago
- (Unofficial) Python API for http://checkusernames.com☆13Jan 15, 2015Updated 11 years ago
- Tools for check NSA EGBL exploit against Fortinet Firewall☆32Aug 18, 2016Updated 9 years ago
- TheRomanXpl0it is an italian academic CTF team from Sapienza, University of Rome.☆14Jan 30, 2026Updated last month
- Tool for checking passwords against TrueCrypt encrypted volumes and disks, and/or decrypting the data.☆42Feb 2, 2017Updated 9 years ago
- A simple kitchen timer implemented in digital logic on a Lattice MachXO2 CPLD.☆14Feb 21, 2017Updated 9 years ago