thsosrtl
Penetration lab
A collection of tools and applications for penetration testing and security analysis on a custom Linux distribution.
Repo for tools
52 stars
8 watching
35 forks
Language: Shell
last commit: almost 11 years ago Related projects:
Repository | Description | Stars |
---|---|---|
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| A local penetration testing lab using Docker Compose to simulate various attack scenarios and systems vulnerabilities. | 182 |
| A tool to simplify network infrastructure penetration testing by automating scanning and enumeration tasks | 1,618 |
| A Rust framework providing implants and tools for command-and-control operations in penetration testing | 565 |
| A collection of tools and scripts for penetration testing and vulnerability assessment of web applications. | 2 |
| Tools for identifying and scanning public Git repositories for security vulnerabilities | 341 |
| A tool designed to facilitate the collection of information on Windows systems during a penetration test | 0 |
| A plugin for the oh-my-zsh shell that provides a set of aliases and functions for performing penetration testing tasks. | 64 |
| A pre-configured Docker container for remote penetration testing in cloud environments. | 132 |
| Automates the creation of a comprehensive security testing environment with various security tooling and logging practices. | 4,662 |
| A comprehensive web application penetration testing framework with modules for reconnaissance, enumeration, and vulnerability analysis. | 1,787 |
| A curated collection of exploit tools and frameworks used in penetration testing and security research. | 334 |
| A collection of cross-site scripting labs and tools to help web application security enthusiasts identify and exploit vulnerabilities. | 296 |
| A vulnerable AWS infrastructure designed to test and demonstrate common web application security risks | 1,760 |
| A collection of scripts designed to facilitate penetration testing and threat simulation by providing tools for reconnaissance, environment setup, and network exploitation. | 207 |