The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with 50+ security tools and custom automation frameworks organized across multiple categories.
☆33Feb 25, 2026Updated 3 weeks ago
Alternatives and similar repositories for va-pt
Users that are interested in va-pt are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Ransack Post Exploitation Tool☆16May 3, 2016Updated 9 years ago
- Scripts and other goodies from the pwnieexpress project ported☆10Mar 16, 2014Updated 12 years ago
- Platform for Browser Exploitation☆34Mar 1, 2015Updated 11 years ago
- IronWASP module to test security of SSL services. Ported from http://www.bolet.org/TestSSLServer/☆12Sep 2, 2013Updated 12 years ago
- Inf0rm3r - A Linux Info & Ssytem Enumeration Script☆12Aug 2, 2013Updated 12 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32May 18, 2022Updated 3 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆19Jan 5, 2022Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 10 months ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Reverser - A Quick Reverse Connection Deployment Script☆12Jun 22, 2012Updated 13 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Basically tries lots of combinations of local and remote usernames to execute commands via RSH☆15May 29, 2015Updated 10 years ago
- ☆18Dec 3, 2024Updated last year
- Capture-The-Flag(CTF) toolkit☆11Jan 8, 2015Updated 11 years ago
- IoT Hacking Kit Details☆19Aug 19, 2025Updated 7 months ago
- THIS REPOSITORY IS STALE. Collection of resources for penetration testing, ethical hacking, cybersecurity, organized by user context.☆10Jan 20, 2017Updated 9 years ago
- ElasticSearch vulnerable scanner☆16Oct 6, 2019Updated 6 years ago
- Exploit Reliability Testing System☆35Apr 24, 2015Updated 10 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Nov 18, 2019Updated 6 years ago
- Cool One Liners at one place to make your recon and bug bounty skills better !☆15Oct 3, 2020Updated 5 years ago
- ☆15Apr 13, 2021Updated 4 years ago
- ☆15Feb 5, 2022Updated 4 years ago
- Collection of the cheat sheets useful for pentesting☆10May 11, 2018Updated 7 years ago
- A tool for harvesting sysadmin credentials in Linux☆19Jul 10, 2024Updated last year
- ☆10Aug 8, 2015Updated 10 years ago
- Template injection allows an attacker to include template code into an existant (or not) template. A template engine makes designing HTML…☆13Jan 30, 2020Updated 6 years ago
- WebXploiter - An OWASP Top 10 Security scanner !☆92Feb 29, 2016Updated 10 years ago
- a collection of useful scripts that for penetration testers☆35Jan 22, 2022Updated 4 years ago
- Search exploits in multiple exploit databases!☆85Oct 1, 2020Updated 5 years ago
- ☆50Apr 10, 2016Updated 9 years ago
- https://exploit-exercises.com/fusion/☆20Dec 29, 2015Updated 10 years ago
- Vulnerable Windows Driver with exploits which were used for demonstration purposes on Hunting and exploiting bugs in kernel drivers prese…☆13Jan 29, 2013Updated 13 years ago
- This automation protect against subdomain takeover on AWS env which also send alerts on slack.☆12Aug 1, 2021Updated 4 years ago
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Mar 18, 2023Updated 3 years ago
- Discover potential timestamps within the Windows Registry☆19Apr 22, 2014Updated 11 years ago
- ☆25May 30, 2017Updated 8 years ago