Just a repo of random Python scripts to get pentesters started with the Python language on engagements.
☆219Feb 29, 2020Updated 6 years ago
Alternatives and similar repositories for python-pentesting
Users that are interested in python-pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,812Apr 6, 2026Updated last month
- A password spraying tool for Microsoft Online accounts (Azure/O365). The script logs if a user cred is valid, if MFA is enabled on the ac…☆1,089Mar 19, 2024Updated 2 years ago
- Useful scripts for pen testing. Require modification to run☆13Oct 17, 2020Updated 5 years ago
- Password spraying using AWS Lambda for IP rotation☆663Feb 14, 2023Updated 3 years ago
- Asynchronous Password Spraying Tool in C# for Windows Environments☆318Dec 19, 2023Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- https://github.com/ManhNho/AWAE-OSWE☆11Aug 1, 2020Updated 5 years ago
- Some python scripts I wrote that help with various specialized AWS security things☆10Jan 15, 2020Updated 6 years ago
- Service Enumeration C# .NET Assembly☆58Sep 14, 2021Updated 4 years ago
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- ShootCutMe an .LNK file creator tool for redteamer☆16Oct 2, 2024Updated last year
- AWS API Gateway management tool for creating on the fly HTTP pass-through proxies for unique IP rotation☆2,246Apr 3, 2023Updated 3 years ago
- Automated NoSQL database enumeration and web application exploitation tool.☆25May 6, 2019Updated 7 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- Deliberately vulnerable AWS resources for security assessment demos☆32Aug 20, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- A PowerShell armoury for security guys and girls☆468Jan 23, 2024Updated 2 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- LibSSH Authentication Bypass Exploit using RCE☆11Oct 25, 2018Updated 7 years ago
- A web shell for pivoting and lateral movement☆33Nov 29, 2017Updated 8 years ago
- AWS CloudTrail CloudFormation template which creates KMS encryption keys, an encrypted S3 bucket, and enables CloudTrail☆14May 26, 2024Updated last year
- Configure AWS accounts for CloudTrail, Root Account Usage Monitor.☆13Aug 24, 2015Updated 10 years ago
- An AWS Pentesting tool that lets you use one-liner commands to backdoor an AWS account's resources with a rogue AWS account - or share th…☆14Feb 16, 2021Updated 5 years ago
- Lateral Movement Using DCOM and DLL Hijacking☆326Jun 18, 2023Updated 2 years ago
- LinkedIn reconnaissance tool☆54Dec 17, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Atomic Purple Team Framework and Lifecycle☆301Feb 11, 2021Updated 5 years ago
- CredSniper is a phishing framework written with the Python micro-framework Flask and Jinja2 templating which supports capturing 2FA token…☆1,382May 22, 2020Updated 5 years ago
- The program is designed to obfuscate the shellcode.☆204Jul 13, 2021Updated 4 years ago
- ssshh its a secret ;)☆21Mar 7, 2022Updated 4 years ago
- Attempts to suspend all known AV/EDRs processes on Windows using syscalls and the undocumented NtSuspendProcess API. Made with <3 for pen…☆13May 11, 2023Updated 2 years ago
- Pentest/BugBounty progress control with scanning modules☆281Jul 16, 2020Updated 5 years ago
- A list of questions that can be asked during an interview for a cloud architect position.☆11Nov 27, 2021Updated 4 years ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆711Sep 4, 2024Updated last year
- PowerMeta searches for publicly available files hosted on various websites for a particular domain by using specially crafted Google, and…☆580Jul 3, 2025Updated 10 months ago
- AI Agents on DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Command line tool to extract/decrypt the password that was stored in the LSA by SysInternals AutoLogon☆224Dec 5, 2020Updated 5 years ago
- This library provides functionality for fetching and parsing information about Common Vulnerabilities and Exposures (CVE) using the NIST …☆14May 11, 2023Updated 2 years ago
- OfensivePipeline allows you to download and build C# tools, applying certain modifications in order to improve their evasion for Red Team…☆820Oct 27, 2023Updated 2 years ago
- 🛡️ A curated collection of awesome resources, tools, and other shiny things for cybersecurity blue teams.☆12Jan 11, 2020Updated 6 years ago
- Helps with finding and registering categorized domains☆70May 6, 2021Updated 5 years ago
- Mimikatz implementation in pure Python☆3,303Apr 9, 2026Updated last month
- Python script to scan Git repos for interesting strings☆163Jul 22, 2020Updated 5 years ago