rossja / pentools
miscellaneous handy pentesting tools
☆63Updated 4 years ago
Alternatives and similar repositories for pentools:
Users that are interested in pentools are comparing it to the libraries listed below
- Stækka Metasploit - Extenting Metasploit☆54Updated 7 years ago
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- ☆47Updated 9 years ago
- ssh session type for metasploit☆98Updated 2 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- This is a big smash up of a lot of various tools I have made in the past along with some new ones. It includes a array of tools for helpi…☆86Updated 10 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 6 years ago
- XSS Tunnel is a standard HTTP proxy which sits on an attacker’s system. XSS Shell is a powerful XSS backdoor, in XSS Shell one can inter…☆87Updated 10 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 7 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 11 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 10 months ago
- ☆53Updated 7 years ago
- DNS Sub-domain brute forcer, in Python + gevent☆50Updated 8 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Burp extension to help developers replicate findings from pen tests☆70Updated 8 months ago
- Exploits and research stuffs☆54Updated last year
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Reconnaissance scripts for penetration testing☆57Updated 9 years ago
- Hacking challenges☆32Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- ☆34Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- This toolkit detects applications vulnerable to DLL hijacking (released in 2010)☆52Updated 10 years ago
- NMAP NSE scripts - (not all)) my contributions before merging to nmap svn☆36Updated 9 years ago
- Projects and POCs☆60Updated 10 years ago
- Operational toolset utilizing git's submodule feature☆56Updated 12 years ago
- Burp extension that checks for interesting and security headers☆43Updated 4 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Collection of tools for privesc on Linux☆34Updated 11 years ago