Cyber Security
☆22Mar 4, 2023Updated 3 years ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Jul 9, 2020Updated 5 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Feb 23, 2022Updated 4 years ago
- [Discontinued] Transform your payload into fake powerpoint (.ppt)☆42Dec 2, 2020Updated 5 years ago
- AMC (Automatic Media Access Control [MAC] Address Spoofing tool), Helps you to protect your real network hardware identity. Each entered …☆22Nov 22, 2024Updated last year
- Script en Bash que automatiza todos los pasos para retransmitir la solicitud de autenticación SMB con el objetivo de obtener una Shell.☆23Jul 16, 2025Updated 8 months ago
- Advanced Phishing Attack.☆11Aug 26, 2020Updated 5 years ago
- Live system forensic collector☆16Jun 8, 2022Updated 3 years ago
- Herramienta para generar virus programada en python☆29Dec 29, 2021Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- An iptables firewall manager☆20Jun 1, 2018Updated 7 years ago
- A Tool For Absolute Beginners On Kali Linux. An Interactive Script That'll Guide You Through Attacks.☆72Aug 19, 2022Updated 3 years ago
- Mass deface's 1500 website☆16Feb 8, 2023Updated 3 years ago
- A Tool For FACEBOOK Phishing From Termux No Root☆58Sep 27, 2020Updated 5 years ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- .NET Tool for parsing and utilizing x86 semantics defined in K. It currently features a WIP symbolic expression generator for VTIL.☆16Feb 4, 2021Updated 5 years ago
- Collection of network scan modules for infrastructure discovery and information gathering.☆20Sep 15, 2025Updated 6 months ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- A load generator for Salt☆14Mar 2, 2022Updated 4 years ago
- A collection of Vulnerable Windows Drivers☆16Dec 4, 2021Updated 4 years ago
- BlazeFox Exploit☆18Oct 13, 2018Updated 7 years ago
- BBT - Bug Bounty Tools☆18Apr 5, 2024Updated last year
- ☆12Apr 25, 2024Updated last year
- st2 salt integration pack☆13Apr 7, 2024Updated last year
- Step by step implementation of FRI☆13Feb 9, 2025Updated last year
- Free Cloud JSON Storage Written in Python☆15Feb 2, 2023Updated 3 years ago
- Minecraft: Bedrock Edition servers, but faster.☆13Dec 31, 2018Updated 7 years ago
- Fuzzing campaign for https://github.com/drips-network/contracts☆10Oct 28, 2025Updated 4 months ago
- Install kali linux repositories in any debian distro☆40Nov 13, 2021Updated 4 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- Public Audits in the NEAR Ecosystem☆14Jun 10, 2024Updated last year
- ☆12Sep 16, 2025Updated 6 months ago
- A collection of Cortana scripts that you may use with Armitage and Cobalt Strike.☆12Jun 20, 2016Updated 9 years ago
- Perform code analysis to detect potentially dangerous vulnerabilities☆13Apr 16, 2024Updated last year
- ☆10Nov 29, 2023Updated 2 years ago
- ☆11Mar 13, 2020Updated 6 years ago
- ☆13Feb 18, 2026Updated last month
- ☆10May 17, 2024Updated last year
- A client interface for the Citybikes API https://api.citybik.es☆11Aug 21, 2025Updated 7 months ago
- Puppet setup to install my own workstation☆13Mar 2, 2026Updated 3 weeks ago