Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.
☆18Jul 8, 2019Updated 6 years ago
Alternatives and similar repositories for RTFM
Users that are interested in RTFM are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Scanner that runs enumeration scripts while you do other things, made for the OSCP exam☆26May 1, 2020Updated 5 years ago
- oscp-ctf is a small collection of basic Bash scripts that make life easier and save time whether you are in the OSCP labs, HackThebox or …☆66Jun 29, 2019Updated 6 years ago
- Just a collection of pentest stuffs☆94Feb 8, 2020Updated 6 years ago
- Python template to assist with buffer overflows☆73Nov 12, 2019Updated 6 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- Custom checklists, cheatsheets, links, and scripts☆127Jul 19, 2019Updated 6 years ago
- ☆23Jan 18, 2021Updated 5 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆18Jun 11, 2019Updated 6 years ago
- Collection of tips, tools and tutorials around infosec☆29May 18, 2017Updated 8 years ago
- ☆510May 27, 2018Updated 7 years ago
- ☆18Oct 14, 2020Updated 5 years ago
- This tool will quickly search for exploitable binaries with SUID bit set in Linux and will output the method of exploitation from GTFObin…☆26Dec 29, 2020Updated 5 years ago
- Linux deniable cryptographic storage eraser based on hardware USB trigger for self-destruction in a case of emergency☆12Apr 16, 2020Updated 5 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- Th3Reverser is a python tool designed to generate reverse shell scripts and commands and exploit them using nclib module for python.☆21Apr 13, 2019Updated 6 years ago
- Python Script to Exploit SpoolService/Printer Bug on Exchange - Thanks to @3xocyte☆22Sep 2, 2019Updated 6 years ago
- The Pentester's Swiss Army Knife☆26Jan 25, 2020Updated 6 years ago
- Python command-line tool that uses nearest neighbor search methods for malware similarity analysis☆16Jan 29, 2019Updated 7 years ago
- ☆1,396Apr 25, 2021Updated 4 years ago
- Scraping creds using Github API and truffleHog☆11Dec 13, 2023Updated 2 years ago
- Burp Plugin for Contrast Security☆16Oct 8, 2025Updated 5 months ago
- Penetration testing “drop box”☆14Sep 12, 2018Updated 7 years ago
- Cuckoo Sandbox is an automated dynamic malware analysis system☆10Sep 11, 2020Updated 5 years ago
- These are the slide decks and source code for Brute Ratel Seminar conducted on 24th August 2023. The youtube video for the seminar can be…☆22Aug 26, 2023Updated 2 years ago
- This is my cheatsheet and scripts developed while taking the Offensive Security Penetration Testing with Kali Linux course.☆487Aug 25, 2021Updated 4 years ago
- Crowdstrike Falcon Host script for iterating through instances to get alert and other relevant data☆13Jul 16, 2019Updated 6 years ago
- public-pentesting-reports☆12Aug 23, 2016Updated 9 years ago
- Pentesting Cheatsheets and Guides☆125Jul 20, 2017Updated 8 years ago
- Vanquish is Kali Linux based Enumeration Orchestrator. Vanquish leverages the opensource enumeration tools on Kali to perform multiple ac…☆510Apr 22, 2018Updated 7 years ago
- A repo of how stuff works, written/gathered right from the basics, so it serves both as a manual and a starting guide.☆63Jul 3, 2021Updated 4 years ago
- EZEA (EaZy Enum Automator), made for OSCP. This tool uses bash to automate most of the enumeration proces☆100May 25, 2021Updated 4 years ago
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆45Apr 4, 2022Updated 3 years ago
- ☆11May 13, 2024Updated last year
- wew oscp☆281Jun 28, 2022Updated 3 years ago
- Red team & penetration testing tools to exploit the capabilities of Intel AMT☆257Apr 6, 2021Updated 4 years ago
- CVE-2020-25223☆11Sep 13, 2021Updated 4 years ago
- Reverse shell container for k8s deployments☆49Feb 21, 2020Updated 6 years ago
- Small easy to find cheat sheet for Active directory exploitation☆44Jul 9, 2020Updated 5 years ago
- 2022 CTF public release☆23Jun 15, 2022Updated 3 years ago