WPExploitation
Penetration testing tool
A tool designed to facilitate the collection of information on Windows systems during a penetration test
Auxiliar a Coleta de Informação.
0 stars
1 watching
0 forks
Language: C
last commit: about 1 year ago coscp-toolspentestpentest-toolpentestingpost-exploitationpost-exploitation-toolkitpythonpython-toolwindows
Related projects:
Repository | Description | Stars |
---|---|---|
| A collection of tools and scripts for penetration testing and vulnerability assessment of web applications. | 2 |
| A collection of scripts designed to facilitate penetration testing and threat simulation by providing tools for reconnaissance, environment setup, and network exploitation. | 207 |
| A comprehensive collection of security tools and resources for pentesting and cybersecurity research | 166 |
| A local penetration testing lab using Docker Compose to simulate various attack scenarios and systems vulnerabilities. | 182 |
| A cheat sheet and resource collection for learning and practicing penetration testing and exploit development | 795 |
| A set of BurpSuite extensions for pentesting and testing | 10 |
| A comprehensive web application penetration testing framework with modules for reconnaissance, enumeration, and vulnerability analysis. | 1,787 |
| An extension for a web application security testing tool that identifies vulnerabilities and exploits HTTP requests for penetration testing. | 355 |
| A penetration testing tool for IoT devices, allowing users to simulate security attacks on target devices. | 211 |
| A plugin for the oh-my-zsh shell that provides a set of aliases and functions for performing penetration testing tasks. | 64 |
| An agent trained to scan for vulnerabilities and exploit them in a simulated network environment | 23 |
| A Docker image with pre-installed tools for creating and running penetration testing environments. | 732 |
| A CS backdoor penetration module plugin that bundles various tools and features into a single package for convenience | 628 |
| Automates known techniques to steal and collect sensitive data from Kubernetes clusters | 1,253 |