Penetration Testing - Intermediate Level
☆16Feb 25, 2020Updated 6 years ago
Alternatives and similar repositories for Penetration-Testing-2
Users that are interested in Penetration-Testing-2 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- API research and learning☆12May 22, 2019Updated 6 years ago
- Kill AMSI in a remote process PoC☆10Aug 18, 2018Updated 7 years ago
- obfuscator.io deobfuscator using go-fAST☆24Dec 10, 2025Updated 4 months ago
- A solver for NuData Security☆11Sep 29, 2024Updated last year
- Amp Rack Guitar Effects Processor for Linux and Windows☆17Mar 26, 2025Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆10Sep 3, 2021Updated 4 years ago
- Prosopo.io solver☆21Feb 20, 2025Updated last year
- Command List for Hashcat and default keyspaces.☆17Feb 13, 2020Updated 6 years ago
- Minigotchi ported to multiple ESP32 devices. (Main Repo (Archived) by @dj1ch)☆15Aug 24, 2025Updated 7 months ago
- ☆10Nov 24, 2024Updated last year
- Capture WPA/WPA2 4-way handshake using BW16 (RTL8720dn)☆17Feb 22, 2026Updated last month
- 2.4Ghz Wifi networks spot jamming device, utilizing ESP32 and nRF24L01+☆14Jan 5, 2024Updated 2 years ago
- Weaponize.it is your go-to resource for gaining insights into pentesting, bug bounty hunting, and scripting.☆12Apr 3, 2025Updated last year
- Low cost aerial surveillance drone☆19Apr 22, 2023Updated 2 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Needed a way to filter all my pwnagotchi handshakes.☆13Feb 8, 2020Updated 6 years ago
- Flask powered website to display tweets with a hashtag #bugbountytip☆16Apr 14, 2020Updated 6 years ago
- a script containing hacktools that make it easier to use for termux☆14Apr 23, 2022Updated 3 years ago
- ☆24Apr 24, 2025Updated 11 months ago
- Hackthebox tools☆13Mar 3, 2019Updated 7 years ago
- Collection of things I've written on pentests to make life easier.☆16Mar 14, 2019Updated 7 years ago
- ☆21Mar 4, 2021Updated 5 years ago
- testing123☆14Nov 23, 2024Updated last year
- ☆10Nov 18, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- ☆20May 22, 2023Updated 2 years ago
- OWASP Foundation Web Respository for VulnerableApp project. Project's codebase Repository: https://github.com/SasanLabs/VulnerableApp☆13Updated this week
- ⚠ For educational purposes. ⚠ Private Unleashed V2 Flipper Zero Firmware PCFW 2.0☆51Jan 4, 2026Updated 3 months ago
- A collection of category-specific host files☆14Oct 18, 2025Updated 5 months ago
- A collection of awesome penetration testing resources, tools and other shiny things☆11Feb 15, 2021Updated 5 years ago
- Akamai BMP APK Analyzer☆30Sep 18, 2024Updated last year
- Read & write magnetic card data to magspoof (ATtiny85)☆12May 27, 2019Updated 6 years ago
- The aim of this project is to design a 433MHz rf jammer using the CC1101 module and the ESP32 (ESP32-WROOM-32u here).☆21May 30, 2025Updated 10 months ago
- Share all files in Internal Storage with another device on the Internet using Termux☆16May 23, 2024Updated last year
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Using linux termux wifi hack ! without monitor mod support wifi hack easy to hack 👀☆25Oct 4, 2023Updated 2 years ago
- Authenticated SSRF in Grafana☆83Jun 24, 2024Updated last year
- Dump your browser environment for fingerprint research.☆125Mar 10, 2026Updated last month
- Simple password crackers used for salted and unsalted passwords encrypted with MD5, SHA-1, and SHA-256 algorithms.☆15Dec 10, 2019Updated 6 years ago
- pen testing scripts☆12Feb 7, 2021Updated 5 years ago
- Short guides for preparing a Linux server to host web apps☆11Jul 28, 2015Updated 10 years ago
- Bypassing ETW with Csharp☆27Oct 28, 2021Updated 4 years ago