rossja / pentoolsLinks
miscellaneous handy pentesting tools
☆63Updated 4 years ago
Alternatives and similar repositories for pentools
Users that are interested in pentools are comparing it to the libraries listed below
Sorting:
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆85Updated 11 years ago
- Autoexploitation of some of the most common vulnerabilities in wild☆123Updated 7 years ago
- A JBoss script for obtaining remote shell access☆177Updated 5 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 8 years ago
- Burp extension that checks for interesting and security headers☆44Updated 5 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 7 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 10 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆88Updated 10 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 8 years ago
- a collection of payloads for common webapps☆72Updated 12 years ago
- MitM pentesting opensource toolkit (scan/sniff/exploit) -- NOT SUPORTED ANYMORE --☆75Updated 9 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆96Updated 5 years ago
- scripts for pentesting☆87Updated 7 years ago
- Inject beef hooks into HTTP traffic and track hooked systems from cmdline☆125Updated 10 years ago
- ☆54Updated 8 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Metasploit modules that didn't make it into trunk for some reason or the other☆119Updated 8 years ago
- ☆100Updated 7 years ago
- ☆47Updated 10 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- Metasploit Usage Wiki☆47Updated 10 years ago
- ☆83Updated 8 years ago
- Avoidz tool to bypass most A.V softwares☆139Updated 8 years ago
- XSSing Your Way to Shell☆32Updated 10 years ago
- Python library that facilitates interfacing with BeEF via it's RESTful API☆79Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- Multi-threaded SSH Password Auditor☆93Updated 11 years ago
- Deploy payloads to *Nix systems en masse☆109Updated 5 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Listing subdomains about a main domain☆58Updated 7 years ago