sodejm / Pentest-ScriptsLinks
Useful scripts I have made for pentests. (nothing pretty)
☆9Updated 2 years ago
Alternatives and similar repositories for Pentest-Scripts
Users that are interested in Pentest-Scripts are comparing it to the libraries listed below
Sorting:
- vyos based isolation of networks☆10Updated 4 years ago
- Docker container for datasploit framework☆26Updated 7 years ago
- Deceptive tradecraft should be fun and light, not stern and stressful. It is cool to be cute.☆13Updated last year
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Updated 4 years ago
- Zsh and Vim on new Linux boxen.☆16Updated 3 years ago
- Following repository contains source codes used in my two Books.☆11Updated 9 years ago
- ☆11Updated 6 years ago
- A curated lust of awesome cyber civil society actors, project etc.☆10Updated 4 years ago
- Python bindings for Yeti's API☆18Updated last year
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- FSL Test bench - Ansible playbook repository to setup a save environment for security auditing and testing. It can be used for teaching s…☆29Updated 6 months ago
- A recon-ng module for crawling Indeed.com for contacts and resumes.☆12Updated 9 years ago
- Chrome extension to extract data from websites surfed inside of chrome☆18Updated 10 years ago
- Automated Static Analysis Framework☆9Updated 3 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- introduction to distributed scanning using vultr☆11Updated 8 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- An MSF plugin to send notifications to Slack when shells are created or killed☆14Updated 8 years ago
- Custom slash command to find all a domains A records from within Slack☆11Updated 9 years ago
- Technical Notes☆16Updated 7 years ago
- Collection of tools for processing storage media images☆14Updated 5 months ago
- Python framework for manipulating bulk WHOIS data from RIRs☆21Updated 3 years ago
- Search bing with python☆12Updated 10 years ago
- Training scenarios for cyber ranges☆11Updated 5 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- A repository for maintaining a list of the top domains based on multiple lists☆21Updated 3 years ago
- DPE - Default Password Enumeration☆34Updated 12 years ago
- Reddit domain search module for Recon-ng☆10Updated 7 years ago
- Test Suite for John the Ripper☆24Updated 3 years ago