My pentest cheat sheet
☆16Apr 27, 2017Updated 9 years ago
Alternatives and similar repositories for umpf
Users that are interested in umpf are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆14Jun 19, 2018Updated 7 years ago
- Ucki's Recon & Enumeration Pack☆39May 9, 2016Updated 9 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- ☆50Jun 24, 2016Updated 9 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆20Jan 25, 2019Updated 7 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- ☆55Aug 18, 2020Updated 5 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 4 years ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 8 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- ☆32Jun 3, 2019Updated 6 years ago
- Learnings from OSCP and other random stuff.☆31Feb 28, 2024Updated 2 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 12 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Aug 6, 2017Updated 8 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 7 years ago
- Fimap post-exploitation plugin that injects dave Rel1k's AES HTTP Reverse Shell☆16Apr 16, 2014Updated 12 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆510May 27, 2018Updated 7 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆20Jun 30, 2020Updated 5 years ago
- ☆18Dec 12, 2020Updated 5 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- PortForce - A custom port Brute Forcing Tool for CTF's & Pentests☆32Jul 18, 2017Updated 8 years ago
- Quickly fetch Let's Encrypt certs and serve a reverse proxy☆105Jan 29, 2022Updated 4 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆45Jun 22, 2015Updated 10 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- WebDigger is a python based tool, specially created to get a company's unknown domain for pentestor.☆17Aug 6, 2016Updated 9 years ago
- Challenges from past S4 (SCADA Security Scientific Symposium) Capture-the-Flag contests.☆28Aug 19, 2016Updated 9 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆278Oct 29, 2018Updated 7 years ago