Pentester Chef cookbook - Install & configures some cool stuff for pentesting
☆11Jun 1, 2020Updated 5 years ago
Alternatives and similar repositories for pentester
Users that are interested in pentester are comparing it to the libraries listed below
Sorting:
- Bash script to fully setup your kali system.☆51Dec 31, 2019Updated 6 years ago
- Open-source Circle of 6 with improved security and privacy features. PLEASE NOTE: For the new Circulo app please visit: https://gitlab.co…☆28May 9, 2019Updated 6 years ago
- A Fork of Auditd geared specifically for running on the Android platform. Includes system applications, AOSP patches, and kernel patches …☆47May 9, 2013Updated 12 years ago
- A quick script to install "all required" tools (Kali-like) for penetration tests☆25Feb 11, 2019Updated 7 years ago
- List of penetration testing tools.☆23Mar 25, 2020Updated 5 years ago
- Pillage is a multithreaded enumeration python script I created for the enumeration phase of penetration tests.☆26Feb 7, 2017Updated 9 years ago
- Tool used for dumping memory from Android devices☆70Jun 12, 2015Updated 10 years ago
- A Kali Linux Tool to assist with security audits and pentesting. Lots of wrappers for commonly used tools to help extend their usefulness…☆31Aug 2, 2013Updated 12 years ago
- Automate your Kali Linux Penetration Testing toolchain☆31May 24, 2015Updated 10 years ago
- ParrotSec Build For Android [Unofficial]☆11Oct 22, 2022Updated 3 years ago
- this script for fix problem vpn on kali linux "Rooling" only :)☆11Feb 17, 2017Updated 9 years ago
- Executable File Viewer☆10Jul 27, 2016Updated 9 years ago
- utilities☆15Jul 2, 2013Updated 12 years ago
- View tables, check queries and see entity descriptions for a SQLite3 database☆10Oct 15, 2014Updated 11 years ago
- G-Surge☆11Feb 7, 2018Updated 8 years ago
- GUI Tool to generate threat intelligence information in various formats☆45Jan 18, 2018Updated 8 years ago
- PowerAuth Web Authentication - Federated Authentication and Authorization Server for Web☆13Updated this week
- Ever wondered if it is possible to setup a private sandbox to mimic a cloud setup - full with load balancers, storage servers, applicatio…☆16Jul 8, 2011Updated 14 years ago
- BlackArch configuration for the bash shell.☆13Jan 11, 2021Updated 5 years ago
- A discord initiative tracker for playing PBP ttRPGs☆11Dec 30, 2024Updated last year
- ☆10Oct 8, 2015Updated 10 years ago
- Knowledge space for some computerforensic stuff☆14Aug 15, 2014Updated 11 years ago
- EtherAnnotate IDA Pro Plugin - Parse EtherAnnotate trace files and markup IDA disassemblies with runtime values☆13May 4, 2010Updated 15 years ago
- IP kung-FU☆10Mar 14, 2019Updated 6 years ago
- ☆10Sep 9, 2019Updated 6 years ago
- A simple NextJS app that streams Langserve (python) streamings on NextJS frontend, using a hook to make it clean on components, and api c…☆10Mar 12, 2024Updated last year
- MipScope is a cross-platform IDE for students learning assembly on the MIPS architecture. The focus is on a convenient debugging environm…☆17May 11, 2024Updated last year
- ☆11Jul 10, 2024Updated last year
- ☆21Jul 25, 2017Updated 8 years ago
- WeakNet PHP Execution Shell☆31Oct 14, 2015Updated 10 years ago
- linux version (rewrite in Python)☆30May 13, 2015Updated 10 years ago
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- ☆13May 30, 2017Updated 8 years ago
- Chrome extension for blocking x-origin cookies☆12Jul 5, 2016Updated 9 years ago
- Bypass Antivm and Cuckoo Sandbox Techniques☆12Oct 12, 2016Updated 9 years ago
- This firewall allows only communications made from allowed processes.☆13Aug 10, 2016Updated 9 years ago
- Format string exploit generation☆10Sep 16, 2015Updated 10 years ago
- Open Database Hunting - Finding potential breaches.☆10Feb 2, 2022Updated 4 years ago
- ☆10Oct 6, 2024Updated last year