tobor88 / BashLinks
Collection of bash scripts I wrote to make my life easier or test myself that you may find useful.
☆39Updated last year
Alternatives and similar repositories for Bash
Users that are interested in Bash are comparing it to the libraries listed below
Sorting:
- Command Execution exploiter with an auto connection handling☆32Updated 3 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- ☆19Updated 4 years ago
- ☆14Updated 4 years ago
- An introduction on how to build a multithreaded ping sweeper and port scanner with Python 3☆27Updated 4 years ago
- Pentesting notes☆18Updated 8 months ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- ☆24Updated 6 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- Pentest stuff☆49Updated last year
- Cheat-Sheet of tools for penetration testing☆53Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆28Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 9 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated 3 weeks ago
- Company Passwords Profiler (aka ComPP) helps making a bruteforce wordlist for a targeted company.☆63Updated 3 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Commands used in Windows penetration tests☆54Updated last week
- Resources for AD penetration testing and security☆33Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 9 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- Notes from various sources for preparing to take the OSCP, Capture the Flag challenges, and Hack the Box machines.☆84Updated 2 months ago
- Custom pentesting tools☆25Updated 4 years ago
- Google Meet Phishing Template For Gophish☆46Updated 3 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- Ease and assist the compromise of an Active Directory environment.☆30Updated 4 years ago
- Information-Gathering Shell Script☆30Updated 5 years ago