syztem4our666 / zsh-pentesterLinks
Pentester plugin for Oh-My-Zsh. Boosting efficiency & and saving time with common initial tasks for pentesting
☆16Updated 11 months ago
Alternatives and similar repositories for zsh-pentester
Users that are interested in zsh-pentester are comparing it to the libraries listed below
Sorting:
- Burp extension used to snip any header from all the requests.☆23Updated 2 years ago
- SSH Private Key Looting Wordlists. A collection of wordlists to aid in locating or brute-forcing SSH private key file names.☆46Updated last year
- Manage attack surface data on Elasticsearch☆23Updated 2 years ago
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Updated last year
- Burp extension to track your current IP address. Extension focused for red teams where the attacker needs to log all used IP addresses.☆25Updated 2 months ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Updated 2 weeks ago
- Monitor your target continuously for new subdomains!☆25Updated 2 years ago
- Tool for scanning domains for .git directories.☆17Updated 2 years ago
- A high-performance domain scanner that discovers active domains by testing multiple Top-Level Domains (TLDs) for given domain names.☆29Updated 2 months ago
- Enumeration & fingerprint tool☆24Updated last year
- A graphical automation to monitor if backdoors/default settings are still active on the compromised machines over time.☆45Updated last year
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated last year
- A complete security assessment tool that supports common web security issues scanning and custom POC | Be sure to read the document befor…☆20Updated last year
- this nuclei template finds back up files☆22Updated 4 months ago
- MalStatWare automates malware analysis with Python. Extract key details like file size, type, hash, path, and digital signature. It analy…☆30Updated last year
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆29Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- ☆12Updated 9 months ago
- Continuous Reconnaissance and Vulnerability Scanning for Bug Bounties☆18Updated last year
- ☆14Updated 10 months ago
- A simple utility to perform reverse WHOIS lookups using whoisxml API☆44Updated 2 years ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Updated 2 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- Stage 1: Sensitive Email/Chat Classification for Adversary Agent Emulation (espionage). This project is meant to extend Red Reaper v1 whi…☆42Updated last year
- The SAP Threat Modeling Tool is an on-premises open-source web application designed to analyze and visualize connections between SAP syst…☆51Updated 10 months ago
- Script for importing Nmap results into a Neo4j Graph Database☆24Updated 8 months ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Updated 2 years ago
- Exploits with pwntools library in Python3. ROP, BOF, SHELLCODE.☆20Updated last year
- A C# Tool to gather information about email breaches☆16Updated 2 years ago