My pentest cheat sheet
☆16Apr 27, 2017Updated 8 years ago
Alternatives and similar repositories for umpf
Users that are interested in umpf are comparing it to the libraries listed below
Sorting:
- ☆14Jun 19, 2018Updated 7 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- ☆51Jun 24, 2016Updated 9 years ago
- A scripted library of hacking techniques.☆18Jul 18, 2018Updated 7 years ago
- A meta-scan tool used to kick off a number of command-line security tools during VA/PT work.☆23May 1, 2022Updated 3 years ago
- Search the ExploitDB with a little more control☆22Jun 4, 2017Updated 8 years ago
- Basics of Windows privilege escalation☆134Sep 30, 2017Updated 8 years ago
- MS17-010☆12Oct 25, 2017Updated 8 years ago
- Notes on Active Directory analysis and exploitation☆11Mar 7, 2019Updated 6 years ago
- My metasploit modules☆11Jul 7, 2015Updated 10 years ago
- Tinkering with bits and bytes☆11Dec 14, 2024Updated last year
- Linux and Windows Hardening Points☆12Mar 6, 2018Updated 7 years ago
- Collection of Nmap scripts☆10Nov 27, 2015Updated 10 years ago
- ☆32Jun 3, 2019Updated 6 years ago
- Netbyte is a Netcat-style tool that facilitates probing proprietary TCP and UDP services. It is lightweight, fully interactive and provid…☆59Dec 15, 2025Updated 2 months ago
- Collection of things made during my SLAE 32-bit journey☆14Feb 24, 2022Updated 4 years ago
- ☆26Sep 1, 2017Updated 8 years ago
- Hacking challenges☆31Oct 3, 2017Updated 8 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Maltego transform to detect the OpenSSL Heartbleed vulnerability (CVE-2014-0160)☆18May 1, 2014Updated 11 years ago
- ☆53Aug 18, 2020Updated 5 years ago
- Exploit for Jenkins serialization vulnerability - CVE-2016-0792☆49Aug 2, 2017Updated 8 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Jul 6, 2022Updated 3 years ago
- Hand list of Powershell commands frequently used during penetration tests☆15Oct 14, 2018Updated 7 years ago
- CLI for programmatic trading of cryptocurrencies on GDAX☆17Jan 16, 2018Updated 8 years ago
- tmp files from tmp notes as tmp-pocs... ;)☆16Jun 3, 2022Updated 3 years ago
- RipGit - Scanner/Scraper of git source deployed☆15Jan 17, 2019Updated 7 years ago
- An automated way to send phishing emails from Google/G-suite.☆18Nov 30, 2018Updated 7 years ago
- Learnings from OSCP and other random stuff.☆31Feb 28, 2024Updated 2 years ago
- Identify common attack paths to get Domain Administrator☆21Aug 20, 2019Updated 6 years ago
- Some are on exploit-db, some aren't. Mostly useless.☆12Jun 21, 2017Updated 8 years ago
- Tooling and commands for common red team and Infrastructure testing tasks☆43Nov 16, 2022Updated 3 years ago
- Generate masscan configuration files for lat/long and Areas. Useful for scanning specific areas.☆20Jun 30, 2020Updated 5 years ago
- A collection of useful scripts for penetration testers☆83Oct 23, 2012Updated 13 years ago
- xdebug reverse shell☆22Jan 18, 2018Updated 8 years ago
- 🌎 A command-line application to help determine the location information from a given ip address or url.☆21Mar 29, 2017Updated 8 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Sep 17, 2020Updated 5 years ago
- Some minor changes to Chimichurri to get it to compile on modern machines☆44Jun 22, 2015Updated 10 years ago
- Supporting data for BAD TRAFFIC Citizen Lab report.☆23Mar 8, 2018Updated 7 years ago