secretsquirrel / offensiveinterviewLinks
Interview questions to screen offensive (red team/pentest) candidates
☆12Updated 8 years ago
Alternatives and similar repositories for offensiveinterview
Users that are interested in offensiveinterview are comparing it to the libraries listed below
Sorting:
- A collection of data exfiltration scripts for Red Team assessments.☆97Updated 5 years ago
- Undetectable Windows Payload Generation☆10Updated 8 years ago
- another pwndb tool with more options☆16Updated 4 years ago
- backdoor-apk is a shell script that simplifies the process of adding a backdoor to any Android APK file. Users of this shell script shoul…☆15Updated 9 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated last year
- autocrack adds queue support for hashcat cracking.☆40Updated 2 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- A script that can see if an email address is valid in Office365 (user/email enumeration). This does not perform any login attempts, is u…☆31Updated 4 years ago
- Leveraging kali Linux, hostapd and dnsmasq to spawn effective access points for wireless penetration tests.☆15Updated 4 years ago
- ScanMan is the amalgamation of Masscan, Metasploit Framework (MSF) and Nmap Scripting Engine (NSE).☆51Updated 6 months ago
- Chalumeau is automated,extendable and customizable credential dumping tool based on powershell and python.☆103Updated 5 years ago
- ☆19Updated 4 years ago
- Build interactive map of cameras from Shodan☆23Updated 5 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆21Updated 3 years ago
- Information-Gathering Shell Script☆30Updated 5 years ago
- VoIP Hopper Network Penetration Testing Tool - Jumping from one VLAN to the next! A network infrastructure penetration testing security …☆75Updated last year
- Various scripts and codes☆85Updated 4 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆53Updated 5 years ago
- Legba recipes.☆51Updated last year
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆33Updated 9 months ago
- ☆154Updated last week
- REST API backend for Reconmap☆46Updated this week
- SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in …☆11Updated 7 years ago
- ☆31Updated last year
- Toolkit for manual buffer exploitation, which features a basic network socket fuzzer, offset pattern generator and detector, bad characte…☆24Updated 6 years ago
- A collection of tools created for computer security research purposes.☆133Updated 5 years ago
- Tool to find and extract credentials from phone configuration files hosted on CUCM☆106Updated 6 years ago
- Yet Another Sniffer for monitoring network traffic☆84Updated 4 years ago
- Wireless Pentesting Device☆24Updated 5 years ago