pentest-tools
Penetration testing toolkit
A collection of custom security tools and scripts for performing various forms of network enumeration, vulnerability testing, and information gathering.
A collection of custom security tools for quick needs.
3k stars
109 watching
793 forks
Language: Python
last commit: almost 2 years ago auditbashbugbountybugbountytipsenumerationhackingnmappentestingphppythonreconsectoolssecuritysecurity-tools
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of Python libraries and tools for network exploitation and reverse engineering. | 2,725 |
| An online security knowledge library with documentation and tools for penetration testing, comprising topics such as network analysis, web application assessment, and vulnerability scanning. | 3,493 |
| A collection of tools and scripts for penetration testing and vulnerability assessment of web applications. | 2 |
| An automation framework for network and web security testing and exploitation. | 1,033 |
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| Automates penetration testing with the help of a large language model | 7,373 |
| A tool for automatically discovering subdomains of given domains | 3,502 |
| A tool for pentesters to map application flows, track vulnerabilities, and manage testing checklists in Burp Suite | 112 |
| Automates subdomain takeover vulnerability checks | 1,091 |
| Scripts for automating common penetration testing tasks | 137 |
| Detailed checklists for penetration testing and red teaming engagements with accompanying blog posts and wiki documentation. | 2,515 |
| Automates reconnaissance and vulnerability scanning of internet targets | 7,343 |
| An AI-powered tool for analyzing pentest screenshots to identify potential vulnerabilities and interesting targets | 1,049 |
| A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,698 |
| An AWS pentesting tool designed to demonstrate the impact of excessive permissions and expose sensitive resources to unauthorized access | 189 |