rsmusllp / python-for-pentesters-webinarLinks
Example Material for SecureState's 2016 Python for Pentesters Webinar
☆10Updated 9 years ago
Alternatives and similar repositories for python-for-pentesters-webinar
Users that are interested in python-for-pentesters-webinar are comparing it to the libraries listed below
Sorting:
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- Office 365 MFA capture toolkit☆14Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Updated 11 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆59Updated 8 years ago
- The initial conversation slides and menu of scenarios☆38Updated 4 years ago
- Damn Vulnerable Node Application☆20Updated 10 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 6 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 8 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Automatically attack all file shares within AD network environment. Exploiting weak permissions.☆17Updated 6 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- A collection of scripts made duing my personal research☆29Updated 7 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- A simplified SMB Email Client Attack script used for pentests.☆29Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- A collection of scripts that I've written while pentesting.☆31Updated 7 years ago
- A tool to catch spoofed NBNS responses.☆51Updated 7 years ago
- Various tools for managing bug bounty recon and exploration.☆48Updated 3 years ago
- Generate MS Word template-based reports with HP WebInspect / Burp Suite Pro input, own custom data and knowledge base.☆67Updated 2 years ago
- A scripted library of hacking techniques.☆18Updated 7 years ago
- A collection of useful scripts for penetration testers☆83Updated 13 years ago
- ☆46Updated 8 years ago
- Windows Privesc Check☆20Updated 11 years ago
- Search the ExploitDB with a little more control☆22Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 9 years ago
- IRC bot for cracking hashes☆18Updated 4 years ago
- malicious file maker/sender to create and send malicious attachments to test your email filter/alerting☆71Updated 8 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago