sodejm / Pentest-Scripts
Useful scripts I have made for pentests. (nothing pretty)
☆9Updated last year
Alternatives and similar repositories for Pentest-Scripts:
Users that are interested in Pentest-Scripts are comparing it to the libraries listed below
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Docker container for datasploit framework☆26Updated 7 years ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆18Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- how-to monitor Docker hosts☆10Updated 8 years ago
- ☆11Updated 6 years ago
- Application Security Vulnerability Periodic Table☆14Updated 10 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- cool dockerfiles☆12Updated 8 years ago
- A tool for gathering potentially sensitive data from github's public stream☆14Updated 8 years ago
- personal fork of OSINT tool recon-ng☆17Updated 7 years ago
- Standardizing Security Titles☆13Updated 2 years ago
- Scan SSL based TCP services, ips, ports and network ranges to obtain certificate expiry data. Get automated alerts about certificates exp…☆29Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Guidelines for writing secure code for Python developers.☆20Updated 7 years ago
- Bash script to automate the installation and buildouts of OpenVPN servers and clients.☆6Updated 11 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- A web app scanner☆26Updated 11 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- vyos based isolation of networks☆11Updated 4 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 2 years ago
- This document proposes a way of standardising the structure, language, and grammar used in security policies.☆25Updated 7 years ago
- Training scenarios for cyber ranges☆11Updated 4 years ago
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 7 years ago
- Checklists☆16Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 8 years ago