A set of recipes useful in pentesting and red teaming scenarios
☆147Jul 7, 2023Updated 2 years ago
Alternatives and similar repositories for pentesting-cookbook
Users that are interested in pentesting-cookbook are comparing it to the libraries listed below
Sorting:
- JustTryHarder, a cheat sheet which will aid you through the PWK course & the OSCP Exam. (Inspired by PayloadAllTheThings)☆827Dec 15, 2025Updated 2 months ago
- ☆15Oct 11, 2023Updated 2 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 6 years ago
- A curated list of tools and techniques written from experience in weaponization of malware☆41Oct 26, 2023Updated 2 years ago
- A curated list of awesome privilege escalation☆1,518Aug 20, 2025Updated 6 months ago
- Emulate the handshake packets of an RDP server with python☆15Jun 26, 2018Updated 7 years ago
- gather gather gather☆584Mar 15, 2025Updated 11 months ago
- My OSCP notes☆225Jul 17, 2024Updated last year
- Tricks for penetration testing☆582Feb 11, 2026Updated 3 weeks ago
- My Tools For Bug Bounty☆69Sep 23, 2024Updated last year
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Jun 5, 2017Updated 8 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Dorks for Google, Shodan and BinaryEdge☆142Mar 3, 2020Updated 6 years ago
- RunPE adapted for x64 and written in C, does not use RWX☆28May 18, 2024Updated last year
- Combine words from two wordlist files and concatenate them with an optional delimiter☆38Sep 25, 2023Updated 2 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Jan 21, 2020Updated 6 years ago
- A BurpSuite plugin for BBRF☆25Nov 17, 2024Updated last year
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆15Dec 26, 2019Updated 6 years ago
- Perform automated network reconnaissance scans☆238May 4, 2023Updated 2 years ago
- Zero Infrastructure Password Cracking☆416Aug 22, 2024Updated last year
- unix SSH post-exploitation 1337 tool☆141Dec 16, 2018Updated 7 years ago
- Windows batch script that finds misconfiguration issues which can lead to privilege escalation.☆673Dec 1, 2024Updated last year
- See adversary, do adversary: Simple execution of commands for defensive tuning/research (now with more ELF on the shelf)☆108Feb 12, 2023Updated 3 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆112Jan 25, 2024Updated 2 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- Spins up a docker container with several useful tools for offensive security in macOS/cloud environments. Also installs the needed depend…☆18Nov 3, 2021Updated 4 years ago
- CVE-2021-40865☆14Nov 26, 2021Updated 4 years ago
- ☆17Oct 21, 2023Updated 2 years ago
- ☆16Feb 10, 2020Updated 6 years ago
- SQLI labs to test error based, Blind boolean based, Time based.☆17Feb 1, 2019Updated 7 years ago
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- Several Python scripts used to fuzz and exploit SLmail. These are meant to supplement the Kali Linux Hands-on Pentesting Udemy course.☆16Dec 24, 2018Updated 7 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Jan 24, 2019Updated 7 years ago
- sudo-parser is a tool to audit complex sudoers files☆18Nov 2, 2022Updated 3 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- SharpReg is a simple code set to interact with the Remote Registry service api and is compatible with Cobalt Strike.☆28Apr 12, 2020Updated 5 years ago
- ☆24Feb 7, 2025Updated last year
- a unique framework for cybersecurity simulation and red teaming operations, windows auditing for newer vulnerabilities, misconfigurations…☆536Mar 27, 2022Updated 3 years ago
- Poor (rich?) man's bug bounty pipeline https://dubell.io☆289Apr 24, 2023Updated 2 years ago