☆19Oct 25, 2020Updated 5 years ago
Alternatives and similar repositories for pentest-book
Users that are interested in pentest-book are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆11Aug 2, 2017Updated 8 years ago
- ☆16Jul 5, 2017Updated 8 years ago
- CVE-2019-18890 POC (Proof of Concept)☆10Jan 6, 2020Updated 6 years ago
- github军火库☆21May 24, 2017Updated 8 years ago
- Takes raw hex shellcode (e.g. msfvenom hex format) from a cmd line arg, text file, or URL download and runs it.☆20Dec 17, 2018Updated 7 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- ELF Virus infection techniques that work with SCOP (Secure code partitioned) executables☆15May 13, 2019Updated 6 years ago
- ☆14Apr 18, 2018Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆26May 10, 2018Updated 7 years ago
- ☆15Aug 17, 2023Updated 2 years ago
- Exploitation Script for CVE-2020-0688 "Microsoft Exchange default MachineKeySection deserialize vulnerability"☆11Apr 1, 2020Updated 5 years ago
- ☆16Dec 7, 2025Updated 3 months ago
- Automate Checkmarx Scanning and Onboarding Plus AWS Access☆12Jan 5, 2023Updated 3 years ago
- ISR-sqlget It's a blind SQL injection tool developed in Perl.☆14Apr 26, 2013Updated 12 years ago
- Fuzzing Framework☆10Oct 23, 2017Updated 8 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Atlassian Questions Hardcoded Password (CVE-2022-26138)☆31Jul 26, 2022Updated 3 years ago
- Tools and scripts for penetration testing☆19Jun 28, 2020Updated 5 years ago
- Showing entropy analysis examples for different data types. example.sh was used to generate. It utilizes cyphunks libdisorder branch and …☆13Dec 24, 2014Updated 11 years ago
- Dines is the definitive answer to DNS testing☆21Dec 10, 2018Updated 7 years ago
- Miscellaneous one-off scripts, exploits, tools, sample code, ...☆10Feb 13, 2019Updated 7 years ago
- Utility to integrate ChatGPT (or other LLMs) into your shell.☆15Mar 29, 2025Updated last year
- This repo exists as a quick and dirty arsenal of methods and scripts to subvert .NET SSL/TLS certificate validation in PowerShell and pre…☆12Jan 28, 2017Updated 9 years ago
- ☆36Jul 13, 2016Updated 9 years ago
- ☆11Nov 22, 2021Updated 4 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 11 years ago
- ☆34Jul 23, 2018Updated 7 years ago
- Solutions to and walkthroughs for ROPemporium.com challenges☆18Nov 13, 2018Updated 7 years ago
- This script allow to scrape shodan.io IoT search engine and get devices IP without using your search or download credit!☆12May 26, 2021Updated 4 years ago
- A virtual MediaWiki development environment, built on Vagrant, VirtualBox, and Puppet.☆16Dec 1, 2016Updated 9 years ago
- A simple Groovy tool to generate IAM policies for Oracle Cloud Infrastructure.☆15Apr 16, 2021Updated 4 years ago
- ApkDissector is a Java Based Android APK Decompiler☆14Jul 28, 2016Updated 9 years ago
- The Python interface for YARA http://virustotal.github.io/yara/☆20Jul 13, 2017Updated 8 years ago
- Pentest utils☆14Oct 8, 2016Updated 9 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- A Wordpress Exploitation Toolkit☆15Nov 22, 2017Updated 8 years ago
- CeramicSkate0 Sysmon configuration fork file template with default high-quality event tracing☆10Sep 29, 2023Updated 2 years ago
- AppImage bundled version xfreerdp with pass the hash function☆15Apr 17, 2018Updated 7 years ago
- A open source ransomware.☆11Apr 8, 2017Updated 8 years ago
- Orchestrate detonating your MalDev in VMs with different EDRs to see their detection surface.☆24Feb 23, 2026Updated last month
- Exploit for win10 SMB3.1☆18Apr 5, 2020Updated 5 years ago
- ☆23Oct 14, 2013Updated 12 years ago