A collection of tools that I use in CTF's or for assessments
☆112Feb 2, 2025Updated last year
Alternatives and similar repositories for pentest-arsenal
Users that are interested in pentest-arsenal are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This OSINT Notebook provides an overview of the tools, techniques, and resources that I use for a variety of situations when it comes to …☆366Aug 14, 2024Updated last year
- Fully automated windows credentials dumper, for SAM (classic passwords) and WINHELLO (pins). Requires to be run from a linux machine with…☆80Nov 18, 2024Updated last year
- Generate AES128 and AES256 Kerberos keys from a given username, password, and realm☆18Sep 18, 2024Updated last year
- x86_64 LKM linux rootkit☆16Jul 1, 2023Updated 2 years ago
- ☆18Jun 25, 2024Updated last year
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- XOR-based shellcode encoder☆29Apr 20, 2023Updated 3 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆245Dec 6, 2024Updated last year
- ☆91May 15, 2024Updated 2 years ago
- Execute commands in other Sessions☆91Jul 29, 2024Updated last year
- This repo for Windows x32-x64 Kernel/User Mode Exploitation writeups and exploits☆24Oct 20, 2025Updated 7 months ago
- SOAPHound is a custom-developed .NET data collector tool which can be used to enumerate Active Directory environments via the Active Dire…☆32May 30, 2024Updated last year
- Decrypt GlobalProtect configuration and cookie files.☆159Sep 10, 2024Updated last year
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 3 years ago
- A companion tool that uses ADeleg to find insecure trustee and resource delegations in Active Directory☆337Feb 16, 2026Updated 3 months ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Leak NTLM via Website tab in teams via MS Office☆79Mar 28, 2024Updated 2 years ago
- comprehensive .NET tool designed to extract and display detailed information about Windows Defender exclusions and Attack Surface Reducti…☆210Jun 10, 2024Updated last year
- List of Stuff I did to get through the OSCP :D☆355Dec 18, 2025Updated 5 months ago
- Use WordPress pingback.ping to transfer files.☆16Feb 25, 2024Updated 2 years ago
- ☆122Jan 30, 2024Updated 2 years ago
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- LDAP enumeration tool implemented in Python3☆225May 20, 2025Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆102Mar 27, 2025Updated last year
- ☆136Feb 11, 2025Updated last year
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- ☆224Oct 22, 2023Updated 2 years ago
- Identifies the bytes that Microsoft Defender / AMSI Consumer flags on.☆11May 17, 2024Updated 2 years ago
- Example code samples from our ScriptBlock Smuggling Blog post☆94Jun 18, 2024Updated last year
- A simple website to act as a store for havoc modules and extensions☆30Jan 20, 2025Updated last year
- Reference list for my Ransomware exploitation research. Lists current DLLs I have seen to date that some ransomware search for, which I h…☆11Jul 16, 2022Updated 3 years ago
- C# DInvoke Shellcode Runner☆31Feb 10, 2025Updated last year
- Modify managed functions from unmanaged code☆53Feb 1, 2024Updated 2 years ago
- Revenant - A 3rd party agent for Havoc that demonstrates evasion techniques in the context of a C2 framework☆389Jul 30, 2024Updated last year
- Generate password spraying lists based on the pwdLastSet-attribute of users.☆55Dec 6, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- SCCMHunter is a post-ex tool built to streamline identifying, profiling, and attacking SCCM related assets in an Active Directory domain.…☆916May 7, 2026Updated last week
- ☆29May 10, 2024Updated 2 years ago
- Apache Solr Backup/Restore APIs RCE Poc (CVE-2023-50386)☆63Feb 29, 2024Updated 2 years ago
- P4wnP1 A.L.O.A. by MaMe82 is a framework which turns a Rapsberry Pi Zero W into a flexible, low-cost platform for pentesting, red teaming…☆34Jul 5, 2025Updated 10 months ago
- ☆29May 16, 2023Updated 3 years ago
- Script to install prerequisites for deploying GOAD on Ubuntu Linux 22.04☆116Jun 12, 2024Updated last year
- DNSChef (NG) - DNS proxy for Penetration Testers and Malware Analysts☆173Nov 26, 2023Updated 2 years ago