thatstraw / pyscriptsforpentesters
This repository will contain python scripts for hackers and pentesters
☆25Updated 2 years ago
Related projects: ⓘ
- List of Github repositories and articles with list of dorks for different search engines☆23Updated 2 years ago
- Writeups on my TryHackMe adventures!☆37Updated 11 months ago
- A fast and powerful http toolkit that take a list of domains to find active domains and other information such as status-code, title, res…☆69Updated last year
- ☆76Updated this week
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆36Updated last year
- ☆46Updated this week
- SWS-Recon is a Python Tool designed to performed Reconnaissance on the given target website- Domain or SubDomain. SWS-Recon collects info…☆20Updated last year
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆45Updated last year
- simple recon tool to help you for searching vulnerability on web server☆61Updated 3 weeks ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆39Updated 3 years ago
- Hit valid URL☆21Updated 2 years ago
- Web Application Vulnerability Exploiter (WAVE) is basically a vulnerability scanner which scans for Secuirity Vulnerabilities in web appl…☆26Updated 2 years ago
- Python Gmail User Enumeration Tool☆112Updated 2 years ago
- XSS Rocket is written by Black Hat Ethical Hacking with the help of #ChatGPT as experimentation, with a lot of hours spent modifying the …☆92Updated last week
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆48Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Updated 3 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 2 years ago
- A repo of useful CyberSec tools/urls, OSINT, Linux security resources, and more.☆22Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆72Updated 3 years ago
- Seamlessly Detect and Construct Exploit POCs with this Automated tool☆33Updated last month
- A collection of Malware Analysis software, materials, libraries, documents, books, resources about malware analysis in Cybersecurity.☆45Updated last year
- This repository contains the files that provide the upload functionality in the IIS Server☆26Updated 3 years ago
- Full Valid Fake Data Generator☆90Updated 2 years ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆108Updated last year
- Simple FREE guide to set up TOR stealth and persistence with complete anonymity.☆56Updated 2 years ago
- ☆45Updated 6 years ago
- A collection of forensics tools, software, libraries, learning tutorials, frameworks, academic and practical resources in Cybersecurity☆58Updated 2 years ago
- Better Google Dorking with Dorker.☆32Updated 2 years ago
- A collection of awesome software, libraries, learning tutorials, documents, books & technical resources and cool stuff about dark web.☆36Updated 4 months ago
- This software is for study to Computer Hacker Forensic Investigator certification☆24Updated 4 years ago