Cyber Security
☆22Mar 4, 2023Updated 3 years ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- ☆31May 22, 2024Updated last year
- AMC (Automatic Media Access Control [MAC] Address Spoofing tool), Helps you to protect your real network hardware identity. Each entered …☆22Nov 22, 2024Updated last year
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- hacking tool menu!☆27Aug 4, 2021Updated 4 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Replacement for the old Unix crypt☆16Sep 17, 2019Updated 6 years ago
- The Web Controller☆10Dec 4, 2019Updated 6 years ago
- This is the linux version of the R.A.T client written in c#☆10Jun 25, 2017Updated 8 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- Herramienta para generar virus programada en python☆29Dec 29, 2021Updated 4 years ago
- A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.☆74Aug 19, 2022Updated 3 years ago
- Mass deface's 1500 website☆16Feb 8, 2023Updated 3 years ago
- ☆14Oct 14, 2022Updated 3 years ago
- A Tool For FACEBOOK Phishing From Termux No Root☆58Sep 27, 2020Updated 5 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- OWASP Foundation Web Respository for VulnerableApp project. Project's codebase Repository: https://github.com/SasanLabs/VulnerableApp☆13Apr 4, 2026Updated last week
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- This is a cross-platform Python 2.x Remote Access Trojan (RAT)☆14Mar 11, 2017Updated 9 years ago
- A load generator for Salt☆14Mar 2, 2022Updated 4 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- ☆12Apr 25, 2024Updated last year
- Step by step implementation of FRI☆13Feb 9, 2025Updated last year
- Free Cloud JSON Storage Written in Python☆14Feb 2, 2023Updated 3 years ago
- A small and portable Windows C library for sandbox detection☆36Oct 2, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Fuzzing campaign for https://github.com/drips-network/contracts☆10Oct 28, 2025Updated 5 months ago
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Install kali linux repositories in any debian distro☆39Nov 13, 2021Updated 4 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- Extend wordlist by appending digits and special characters to each word.☆11Apr 26, 2023Updated 2 years ago
- Public Audits in the NEAR Ecosystem☆14Jun 10, 2024Updated last year
- ☆14Sep 16, 2025Updated 6 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Perform code analysis to detect potentially dangerous vulnerabilities