stevecoward / ansible-pentest-deployView external linksLinks
Using Ansible as an orchestrator, this project is another solution for testers looking to configure and deploy a new VM or VPS box with the tools that they need for penetration testing.
☆20Dec 3, 2017Updated 8 years ago
Alternatives and similar repositories for ansible-pentest-deploy
Users that are interested in ansible-pentest-deploy are comparing it to the libraries listed below
Sorting:
- Security Notes☆11Oct 10, 2018Updated 7 years ago
- Simple PowerShell enumeration script to look for interesting files☆10Aug 26, 2019Updated 6 years ago
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- An On-The-Cloud free "greybox" box scanner for various purposes.☆14Nov 21, 2017Updated 8 years ago
- Java Binary data Deserializer/Serializer - Convert serialized Java Objects into readable XML☆13Feb 25, 2019Updated 6 years ago
- A CSRF guard hiding extension that keeps track of the latest guard value per session and update new requests accordingly☆18Oct 7, 2015Updated 10 years ago
- This tool is designed to simplify and automate the extraction and organization of useful data from Cobalt Strike logs.☆18Apr 24, 2019Updated 6 years ago
- Simple golang reverse shell☆20Jan 22, 2020Updated 6 years ago
- Custom scripts used during the scenario☆21Apr 5, 2021Updated 4 years ago
- A talk+workshop on Accelerating Your Security Learning in 2017 given at null Bangalore 2017☆13Jan 23, 2017Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- A repo to hold any bypasses I work on/study/whatever☆19Dec 30, 2020Updated 5 years ago
- Async / concurrent HTTP requests for Go☆50Jun 29, 2023Updated 2 years ago
- OpSec in OSINT - An evolving guide on how to stay safe and private during open source intelligence investigations☆21Jul 4, 2017Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Jan 1, 2017Updated 9 years ago
- A curated list of tools for incident response☆34Mar 2, 2024Updated last year
- A powershell script for cracking halfLMchall password hashes☆22Feb 5, 2013Updated 13 years ago
- ☆28Apr 3, 2018Updated 7 years ago
- ☆25Dec 13, 2016Updated 9 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆59Jan 8, 2018Updated 8 years ago
- A collection of scripts made duing my personal research☆29Sep 27, 2018Updated 7 years ago
- AV Bypass☆29Jan 12, 2018Updated 8 years ago
- An experiment into dynamic hooking and modification of Android application functions and return values.☆33Nov 17, 2017Updated 8 years ago
- Automated Information Retrieval From APKs For Initial Analysis☆33Oct 2, 2017Updated 8 years ago
- An improved version of Sublist3r, a python based Fast subdomains enumeration tool for penetration testers☆10Feb 10, 2024Updated 2 years ago
- BSidesCBR CTF docker compose files☆66Jun 4, 2020Updated 5 years ago
- A collection of pentest tools and resources targeting Hadoop environments☆35Mar 2, 2017Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Dec 18, 2019Updated 6 years ago
- Run multiple PowerShell scripts concurrently in different app domains!☆35Dec 24, 2015Updated 10 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- A tool to analyse JMX API security level.☆43Jul 23, 2014Updated 11 years ago
- ☆35Dec 3, 2024Updated last year
- A tool to extract database data from a blind SQL injection vulnerability.☆32Jan 4, 2016Updated 10 years ago
- XSSB is a proactive DOM sanitizer, defending against client-side injection attacks!☆38Aug 26, 2018Updated 7 years ago
- ☆12Jun 26, 2023Updated 2 years ago
- Use Tor for anonymous scanning with nmap☆92Jun 19, 2015Updated 10 years ago