tatanus / Python4Pentesters
These are various simple python scripts that can be used to aid pentesters. None of these are overly complex, but should serve as a great starting point for more advanced tools/scripts.
☆23Updated 6 years ago
Alternatives and similar repositories for Python4Pentesters:
Users that are interested in Python4Pentesters are comparing it to the libraries listed below
- NOT SUPORTED ANYMORE -- try resource_files repository (mosquito)☆49Updated 7 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- My collection of nmap nse modules☆63Updated 5 years ago
- Create lists from nmap output.☆13Updated 4 years ago
- python code to connect to mail servers and pillage the data contained within☆10Updated 9 years ago
- A few simple scripts and templates I have used during various phishing engagements.☆61Updated 10 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- Small backdoor using cookie.☆60Updated 8 years ago
- ☆81Updated last year
- Specify targets and run sets of tools against them☆11Updated 10 years ago
- This is just a dumping ground for metasploit modules that I've worked on or am working on. Some have been submitted to Rapid7 and some h…☆17Updated 9 years ago
- NetRipper - Smart traffic sniffing for penetration testers☆17Updated 9 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- PHP Phishing Framework☆28Updated 11 years ago
- A single repository for any security tools, scripts, documentation, etc. that I add☆12Updated 8 years ago
- A ton of helpful tools☆16Updated 8 years ago
- USB-Rubber-Ducky Payload - Mimikatz in Memory w UAC Bypass☆35Updated 9 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 7 years ago
- A swiss army knife for pentesting Windows/Active Directory environments☆14Updated 6 years ago
- Metasploit Usage Wiki☆48Updated 10 years ago
- ☆24Updated 9 years ago
- Custom stagers with python encrypting proxy☆39Updated 9 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- Analyze Wireless Packets on the fly. Currently supporting three working Modes (Reader, Live, Stealth)☆51Updated 7 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- Intelligent threat hunter and phishing servers☆47Updated 6 years ago
- Automatically exported from code.google.com/p/unix-security-file-parser☆34Updated 9 years ago
- Massive arsenal of hacker tools...☆78Updated 7 years ago
- Metateta Automated Tool For Scanning And Exploiting Network Protocols Using Metasploit☆84Updated 6 years ago
- Transferring Backdoor Payload by BSSID and Wireless traffic☆57Updated last year