vishnudxb / automated-pentestView external linksLinks
Minimal docker container of Parrot OS for running an automated scan & pentest report.
☆193Jul 13, 2023Updated 2 years ago
Alternatives and similar repositories for automated-pentest
Users that are interested in automated-pentest are comparing it to the libraries listed below
Sorting:
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- An anomaly-based intrusion detection system.☆85Dec 8, 2022Updated 3 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆400Nov 12, 2019Updated 6 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆141Jun 26, 2019Updated 6 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆319Jan 3, 2026Updated last month
- source code audit tool☆48May 9, 2021Updated 4 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 6 years ago
- Transparently log all data passed into known JavaScript sinks - Sink Logger extension for Burp.☆49Jul 20, 2022Updated 3 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43May 1, 2020Updated 5 years ago
- Seed Corpus for clamav-devel oss-fuzz integration.☆34Jul 30, 2019Updated 6 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆398Apr 17, 2020Updated 5 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- thinkphp5 RCE auto exploit☆11Jun 19, 2019Updated 6 years ago
- burp extender for fuzzing☆10Aug 10, 2018Updated 7 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Oct 18, 2018Updated 7 years ago
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 6 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- Disposable Kali Linux containers for Mercury ISS / pentesting engagements.☆38Aug 21, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- ☆61Mar 16, 2018Updated 7 years ago
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆423Jul 18, 2018Updated 7 years ago
- an asynchronous target enumeration tool☆245Dec 8, 2022Updated 3 years ago
- Take a list of IP addresses and probe for working HTTP and HTTPS servers☆12Mar 12, 2020Updated 5 years ago
- Toy implementation of a Automated Exploit Generation built on Angr; stiched using radare, pwntools, pyelftools, and Angrop.☆16Jan 9, 2022Updated 4 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- Convert a raw firmware image to an ELF file.☆13Feb 6, 2019Updated 7 years ago
- PoC Code for CVE-2018-16712 (exploit by MmMapIoSpace)☆25Dec 1, 2018Updated 7 years ago
- CVE-2018-8021 Proof-Of-Concept and Exploit☆106Dec 3, 2018Updated 7 years ago
- The Pentester's Swiss Army Knife☆26Jan 25, 2020Updated 6 years ago
- ☆11Mar 30, 2017Updated 8 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Automated Tactics Techniques & Procedures☆260May 26, 2023Updated 2 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆23Nov 29, 2023Updated 2 years ago