Some Pentest Tools. Install and keep up to date some pentesting tools. I used this to pass my OSCP exam.
☆65Aug 24, 2021Updated 4 years ago
Alternatives and similar repositories for Some-Tools
Users that are interested in Some-Tools are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Zoho ManageEngine Desktop Central CVEs☆15Oct 5, 2020Updated 5 years ago
- Massive NSE (Nmap Scripting Engine) AutoSploit and AutoScanner☆12Apr 25, 2018Updated 8 years ago
- nmap -> searchploit -> GoBuster/Eyewitness & LDAPsearch & SMBclient & Showmount☆21Apr 26, 2020Updated 6 years ago
- asnap aims to render recon phase easier by providing updated data about which companies owns which ipv4 or ipv6 addresses and allows the …☆25Jan 6, 2021Updated 5 years ago
- Scripts usados en mi formación de Offensive Security por medio de la suscripción Learn Unlimited☆16Apr 23, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- A collection of personal scripts used in hacking excercises.☆152Oct 15, 2020Updated 5 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- A JavaScript components vulnerability scanner, based on RetireJS☆36Jun 8, 2020Updated 5 years ago
- Data exfiltration utility for testing detection capabilities☆56Jan 13, 2022Updated 4 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆19Sep 17, 2019Updated 6 years ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Resilient, Stealthy & Capable Windows Backdoor. Utilizing Telegram for command relays☆13Feb 12, 2023Updated 3 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆34Apr 26, 2021Updated 5 years ago
- Network Attack wifi attack vlan attack arp attack Mac Attack Attack revealed etc../☆147Jul 12, 2020Updated 5 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆17Mar 5, 2020Updated 6 years ago
- Custom Command and Control (C3). A framework for rapid prototyping of custom C2 channels, while still providing integration with existing…☆11Oct 6, 2020Updated 5 years ago
- Matryoshka loader is a tool that red team operators can leverage to generate shellcode for Microsoft Office document phishing payloads.☆43May 24, 2021Updated 4 years ago
- ☆36Jan 22, 2025Updated last year
- Default plugins for Jaeles Scanner☆36Nov 5, 2020Updated 5 years ago
- OptionsBleed (CVE-2017-9798) PoC / Scanner☆18May 21, 2024Updated last year
- Wordlists generated over the years of penetration testing☆13Mar 18, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆15Jan 20, 2021Updated 5 years ago
- Powershell reverse shell using HTTP/S protocol with AMSI bypass and Proxy Aware☆598Aug 27, 2024Updated last year
- A productivity burp extension which reminds to take break while you are at work!☆18May 31, 2020Updated 5 years ago
- Covenant is a collaborative .NET C2 framework for red teamers.☆13Jul 15, 2022Updated 3 years ago
- Random Hashcat Scrips☆39Oct 12, 2024Updated last year
- ☆12Jun 30, 2017Updated 8 years ago
- XSHOCK Shellshock Exploit☆87Dec 8, 2022Updated 3 years ago
- Find exposed data in Azure with this public blob scanner☆353Jul 7, 2024Updated last year
- ☆128May 22, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆46Dec 20, 2020Updated 5 years ago
- ☆20Mar 21, 2024Updated 2 years ago
- AutoKali automatically installs useful programs and scripts for recon, enumeration and exploitation for Kali Linux that aren't included b…☆18Jul 20, 2023Updated 2 years ago
- A template for documenting penetration tests with OneNote.☆21Feb 15, 2020Updated 6 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Aug 6, 2021Updated 4 years ago
- ☆20Dec 29, 2024Updated last year
- An analysis on cryptocurrency mining malware embedded via JavaScript.☆13Mar 19, 2018Updated 8 years ago