Penetration Testing - Intermediate Level
☆16Feb 25, 2020Updated 6 years ago
Alternatives and similar repositories for Penetration-Testing-2
Users that are interested in Penetration-Testing-2 are comparing it to the libraries listed below
Sorting:
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆16Feb 22, 2026Updated last week
- ☆16Dec 2, 2011Updated 14 years ago
- Perform code analysis to detect potentially dangerous vulnerabilities☆13Apr 16, 2024Updated last year
- My Scripts for template VMs☆15Jan 22, 2026Updated last month
- 2.4Ghz Wifi networks spot jamming device, utilizing ESP32 and nRF24L01+☆13Jan 5, 2024Updated 2 years ago
- ☆12Feb 16, 2012Updated 14 years ago
- A sample web application using Node.js, Express and Angular that is vulnerable to common security vulnerabilities.☆10Jun 15, 2023Updated 2 years ago
- Minigotchi ported to multiple ESP32 devices. (Main Repo (Archived) by @dj1ch)☆14Aug 24, 2025Updated 6 months ago
- Hack for start other istance of wpa_supplicant daemon☆13Nov 16, 2017Updated 8 years ago
- React UI☆11Jan 4, 2023Updated 3 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated 11 months ago
- a script containing hacktools that make it easier to use for termux☆14Apr 23, 2022Updated 3 years ago
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- Low cost aerial surveillance drone☆19Apr 22, 2023Updated 2 years ago
- A curated list of awesome Arch-related projects,softwares and resources.☆16May 9, 2021Updated 4 years ago
- Package antideb - basic anti-debugging and anti-reverse engineering protection for your application. Performs basic detection functions s…☆11Mar 2, 2021Updated 5 years ago
- testing123☆12Nov 23, 2024Updated last year
- Extend wordlist by appending digits and special characters to each word.☆10Apr 26, 2023Updated 2 years ago
- Differential Equations Guide☆14Jan 9, 2022Updated 4 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 6 years ago
- Data Structure and Algorithm explanations with Implementations by Python☆15Jul 12, 2021Updated 4 years ago
- ☆10Nov 18, 2020Updated 5 years ago
- Kali in a Box - Containerized and fully operational within your Browser☆13Nov 17, 2025Updated 3 months ago
- Open source tools mentioned in Advanced Penetration Testing Hacking the World's Most Secure Networks☆11Feb 12, 2018Updated 8 years ago
- ☆11Sep 12, 2022Updated 3 years ago
- Reducing the private key through scalar multiplication using the ECPy + Google Colab library☆13Dec 7, 2022Updated 3 years ago
- Automatically reloads HoRNDIS kext when usb tether device is plugged in☆10Dec 18, 2017Updated 8 years ago
- Passive IP recon tool using Shodan API to gather metadata, vulnerabilities, and CVE information for analysis.☆15Mar 5, 2025Updated last year
- Pentesting-related Bash Scripts☆12Jan 4, 2020Updated 6 years ago
- Problems can be found over - https://www.hackerrank.com/domains/shell/bash/☆13Jan 20, 2015Updated 11 years ago
- An emulator/debugger/disassembler I made for 8080☆16Nov 17, 2018Updated 7 years ago
- Very simple app-indicator, which shows gtk-bookmarks (aka places)☆22Sep 19, 2015Updated 10 years ago
- ☆13Feb 18, 2026Updated 2 weeks ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- Short guides for preparing a Linux server to host web apps☆11Jul 28, 2015Updated 10 years ago
- Automate Burp Suite Professional setup on macOS with multi-version support, JDK 21, built-in keygen, and instant launcher for pentesters …☆19Sep 27, 2025Updated 5 months ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- exploit-database-papers☆13Nov 27, 2017Updated 8 years ago
- Working on a small SQL Injection framework☆17Aug 30, 2025Updated 6 months ago