stackrip / ctfman_pagesLinks
The yaml documents for the CTFman search system.
☆12Updated 6 years ago
Alternatives and similar repositories for ctfman_pages
Users that are interested in ctfman_pages are comparing it to the libraries listed below
Sorting:
- Miscellaneous pentesting scripts for OSCP☆59Updated 6 years ago
- A modified version of Mike Czumak's enumeration scanner☆19Updated 6 years ago
- Linux Local Privesc Helper and Agent☆166Updated 5 years ago
- Python Tool for Host Enumeration☆50Updated 8 years ago
- ☆52Updated 5 years ago
- Ucki's Recon & Enumeration Pack☆39Updated 9 years ago
- Common Findings Database☆101Updated 6 years ago
- Professionally Evil Web Application Penetration Testing 101☆145Updated 5 years ago
- Accepts a domain name and queries multiple sources to return subdomains. Includes option to scan the returned subdomains to check connect…☆14Updated 6 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Open Red Team Bag of Tricks - Red Teaming and Pentesting cheat sheet and trick book☆97Updated 8 years ago
- This tool creates an initial file repository directory tree structure for penetration test reporting/file storage based on single host, l…☆32Updated 8 years ago
- Tool used for enumeration, reporting, and automating low hanging fruit during a penetration test.☆18Updated 6 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 9 years ago
- Loot email addresses from commit entries☆56Updated 2 years ago
- Small CTF challenges running on Docker☆159Updated 7 years ago
- The Unofficial Burp Extension for DNSDumpster.com☆70Updated 7 years ago
- ☆26Updated 8 years ago
- A tool to enumerate network services☆25Updated 5 years ago
- ☆122Updated 7 years ago
- Microsoft Excel spreadsheets for consistent security evaluation of Android and iOS mobile applications☆50Updated 9 years ago
- Some of the scripts I use.☆41Updated 8 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- A tool for importing vulnerability scanner data and then allowing you to manipulate the risks, affected hosts, and create risk ordered ou…☆80Updated last year
- Reporting Tips for Penetration Testers☆31Updated 4 years ago
- You're a #pentester and you totally pwn that linux box, congrats! Now what? You can launch gimmecredz.sh which will try to extract all p…☆169Updated 5 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Batch file to help automate Windows enumeration for privilege escalation☆89Updated 8 years ago
- An automated SMB relay exploitation script.☆155Updated 8 years ago