A ton of helpful tools
☆39Oct 8, 2021Updated 4 years ago
Alternatives and similar repositories for PenTesting-Scripts
Users that are interested in PenTesting-Scripts are comparing it to the libraries listed below
Sorting:
- Library of traffic redirectors☆26Apr 7, 2020Updated 5 years ago
- ☆98Mar 16, 2016Updated 10 years ago
- A Tool for cross-platform System Enumeration☆12Mar 20, 2017Updated 9 years ago
- ☆50Sep 25, 2017Updated 8 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Mar 8, 2018Updated 8 years ago
- Evil snippets of Underhanded Red Team tactics☆11Jul 5, 2017Updated 8 years ago
- Service desk password tools.☆16Apr 21, 2017Updated 8 years ago
- Generates several metasploit payloads☆15Apr 13, 2018Updated 7 years ago
- Post-exploitation scripts for OS X persistence and privesc☆73Apr 12, 2017Updated 8 years ago
- This module is used to exploit startup script execution through Windows Group Policy settings when configured to run off of a remote SMB …☆22Feb 6, 2020Updated 6 years ago
- A cobaltstrike script that integrates DDEAuto Attacks☆63Oct 17, 2017Updated 8 years ago
- In case you didn't now how to restore the user password after a password reset (get the previous hash with DCSync)☆169Jun 8, 2017Updated 8 years ago
- Enumerate subdomains through Virustotal☆32Nov 2, 2019Updated 6 years ago
- POC Highlighting Obfuscation Techniques used by FIN threat actors based on cmd.exe's replace functionality and cmd.exe/powershell.exe's s…☆105Jul 2, 2017Updated 8 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Oct 24, 2017Updated 8 years ago
- Web Filter External Enumeration Tool (WebFEET)☆78Aug 24, 2014Updated 11 years ago
- Subdomain brute force focused on speed and data serialization☆75Dec 27, 2022Updated 3 years ago
- Random Tools☆850Oct 20, 2022Updated 3 years ago
- pwnig all the (web)things☆21Nov 21, 2020Updated 5 years ago
- Scraps for publicly accessible MongoDB instances and dumps user passwords☆33Mar 4, 2016Updated 10 years ago
- Uses viewdns.info to perform a reverse NS lookup on a specified nameserver and attempts zone transfers on discovered domains☆19May 2, 2019Updated 6 years ago
- BGP Route Leaks Detection☆71Dec 7, 2018Updated 7 years ago
- A better SSL cipher checker using gnutls☆28May 17, 2017Updated 8 years ago
- ☆23Feb 9, 2018Updated 8 years ago
- Application Security Vulnerability Periodic Table☆14Aug 25, 2014Updated 11 years ago
- A ton of helpful tools☆345Oct 8, 2021Updated 4 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Aug 10, 2013Updated 12 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- Search for potential frontable domains☆643Mar 22, 2023Updated 2 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- ☆12Nov 3, 2020Updated 5 years ago
- Patch for hostapd and wpa_supplicant to attempt to exploit heartbleed on EAP-PEAP/TLS/TTLS connections☆107May 29, 2014Updated 11 years ago
- Weape-Wireless-EAP-Extractor☆29Sep 1, 2013Updated 12 years ago
- GoFetch is a tool to automatically exercise an attack plan generated by the BloodHound application.☆634Jun 20, 2017Updated 8 years ago
- Generates Flash based CORS CSRF Proof of Concepts that can be sent directly to clients☆14Jul 3, 2013Updated 12 years ago
- NMAP NSE that enumerates VNC authentication types☆17Dec 21, 2010Updated 15 years ago
- Various Cheat Sheets☆183Jun 24, 2021Updated 4 years ago
- Discover MSSQL Instances via UDP Scanning☆25Dec 17, 2018Updated 7 years ago
- Mixing up CVE and MS like a pro☆25Mar 27, 2017Updated 8 years ago