scs-labrat / commanderLinks
Command generator for pentesting tools
β16Updated last year
Alternatives and similar repositories for commander
Users that are interested in commander are comparing it to the libraries listed below
Sorting:
- π LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.β54Updated 11 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making iβ¦β152Updated last month
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresseβ¦β251Updated 5 months ago
- Quick scripts I developed to streamline OSCP tasksβ200Updated 6 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enuβ¦β109Updated 6 months ago
- Scripts for offensive securityβ176Updated 6 months ago
- β140Updated 6 months ago
- Find CVEs associated to Linux and public exploits on githubβ119Updated 8 months ago
- this repository made to help me All Dorking repositories find for one locationβ34Updated 3 months ago
- My notes while studying for the PNPT from TCM Security.β82Updated last year
- πͺ XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XSβ¦β55Updated 11 months ago
- The tool π²π»ππΊπ is a framework built for Kali Linux that uses a plethora of existing pentesting tools as plugins in order to simplifyβ¦β38Updated 11 months ago
- Everything from my OSEP study.β180Updated 11 months ago
- π erroreyes β Lightweight Subdomain Enumeration Tool A Python-based tool that queries crt.sh certificate logs to discover subdomains assβ¦β16Updated 7 months ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.β309Updated 4 months ago
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs β¦β258Updated 8 months ago
- A curated list of essential digital forensics tools used for investigation, data recovery, and security analysis. These tools help in disβ¦β95Updated 9 months ago
- OneLinerBounty is a collection of quick, actionable bug bounty tips in one-liner format. Perfect for bug hunters looking to boost their sβ¦β55Updated 8 months ago
- A visual reference of 118 essential red team tools, frameworks & standards, organized like a periodic table. Includes a printable PDF verβ¦β126Updated last month
- Active Directory Mindmap Recipes: A Compromise Γ la Carteβ143Updated 3 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0β223Updated 3 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.β94Updated 4 months ago
- List of tools and resources for pentesting Microsoft Active Directoryβ111Updated 5 months ago
- API Pentesting Tools are specialized security tools used to test and analyze the security of Application Programming Interfaces (APIs).β226Updated 8 months ago
- β‘ XSSuccessor is a powerful, asynchronous Cross-Site Scripting (XSS) detection tool.β57Updated 11 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offeβ¦β161Updated 9 months ago
- Notes for OSCP & CPTS.β53Updated 2 months ago
- Injectra is a Python-based tool for injecting custom payloads into various file types using their magic numbers. It supports file types lβ¦β142Updated 11 months ago
- β222Updated 8 months ago
- β317Updated last year