Minimal docker container of Parrot OS for running an automated scan & pentest report.
☆195Jul 13, 2023Updated 2 years ago
Alternatives and similar repositories for automated-pentest
Users that are interested in automated-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- IDS/IPS malware download evasion☆15Feb 21, 2019Updated 7 years ago
- Poison Ivy Appendix/Extras☆18Aug 21, 2013Updated 12 years ago
- A simple static site generator with an integrated toolchain for efficient development and delivery.☆20Sep 24, 2021Updated 4 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- PoC for CVE-2019-10149, this vulnerability could be xploited betwen 4-87 to 4.91 version of Exim server.☆14Jun 18, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- thinkphp5 RCE auto exploit☆11Jun 19, 2019Updated 6 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆402Nov 12, 2019Updated 6 years ago
- An anomaly-based intrusion detection system.☆85Dec 8, 2022Updated 3 years ago
- The Pentester's Swiss Army Knife☆27Jan 25, 2020Updated 6 years ago
- Abusing SketchUp to make persistence on Windows☆21Mar 26, 2019Updated 7 years ago
- Hamburglar -- collect useful information from urls, directories, and files☆320Jan 3, 2026Updated 3 months ago
- Slides(In both CN and EN) & WP(outdated) of my topic in HITCON 2019 about bug hunting in Android NFC☆15Aug 26, 2019Updated 6 years ago
- A collection of YARA rules for public use. Built from information in intelligence profiles, dossiers and file work.☆18Sep 10, 2023Updated 2 years ago
- PowerShell based Active Directory Honey User Account Management with Universal Dashboards☆140Jun 26, 2019Updated 6 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Watchdog - A Comprehensive Security Scanning and a Vulnerability Management Tool.☆426Jul 18, 2018Updated 7 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Apr 17, 2020Updated 5 years ago
- 漏洞复现记录☆11Jun 18, 2019Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Nov 7, 2017Updated 8 years ago
- Guard Cats - scripts to automate certain "hack" tasks on NetHunter☆17Sep 27, 2018Updated 7 years ago
- CVE-2018-19276 - OpenMRS Insecure Object Deserialization RCE☆16Mar 11, 2019Updated 7 years ago
- GitLab as a Sandstorm app☆20Jun 10, 2017Updated 8 years ago
- Burp plugin to turn requests into curl commands☆16Apr 25, 2014Updated 11 years ago
- This tool is uses for SQLI+LFI+XSS+LFI+RCE Dorking and finding vulnerable sites.☆31Feb 19, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- Periodically scan target ranges using nmap, ndiff and emailing changes☆11Jan 13, 2017Updated 9 years ago
- an asynchronous target enumeration tool☆249Dec 8, 2022Updated 3 years ago
- Packet Knock-Out is an exploration in a method of data exfiltration via packet port numbers.☆14Sep 18, 2016Updated 9 years ago
- Convert a raw firmware image to an ELF file.☆14Feb 6, 2019Updated 7 years ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Getting Started with Docker☆15Oct 30, 2016Updated 9 years ago
- PoC for CVE-2019-0888 - Use-After-Free in Windows ActiveX Data Objects (ADO)☆40Jul 9, 2019Updated 6 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- Delightful Node.js packages useful for penetration testing, exploiting, reverse engineer, cryptography ...☆425Jun 19, 2021Updated 4 years ago
- Generate pentest reports based on github issues.☆15Dec 8, 2022Updated 3 years ago
- Create PPP discount codes in Gumroad☆24Oct 2, 2020Updated 5 years ago
- Linux Local Privesc Helper and Agent☆166Dec 2, 2019Updated 6 years ago
- source code audit tool☆49May 9, 2021Updated 4 years ago
- BURP extension providing a set of values for the HTTP request "Host" header for the "BURP Intruder" in order to abuse virtual host resolu…☆60Oct 8, 2017Updated 8 years ago
- Vulmap Online Local Vulnerability Scanners Project☆970Mar 18, 2023Updated 3 years ago