PRET
Printer Exploitation Tool
A tool designed to test and exploit printer security features for malicious purposes.
Printer Exploitation Toolkit - The tool that made dumpster diving obsolete.
4k stars
197 watching
613 forks
Language: Python
last commit: 4 months ago
Linked from 2 awesome lists
Related projects:
Repository | Description | Stars |
---|---|---|
prusa3d/prusaslicer | Generates G-code instructions for 3D printers from 3D models | 7,756 |
peass-ng/peass-ng | A suite of scripts and binaries for discovering local privilege escalation paths in operating systems | 16,117 |
manisso/fsociety | A comprehensive collection of hacking tools and scripts for penetration testing and vulnerability assessment | 10,637 |
stamparm/maltrail | Detects and analyzes malicious traffic patterns to identify potential security threats. | 6,535 |
praetorian-inc/noseyparker | Find secrets and sensitive information in textual data | 1,693 |
greydgl/pentestgpt | Automates penetration testing with the help of a large language model | 7,253 |
kliment/printrun | A Python-based suite of hosts and tools for 3D printing and CNC machining | 2,380 |
lordnoteworthy/al-khaser | A Proof-of-Concept malware application designed to test anti-malware and sandbox systems. | 5,919 |
dominicbreuker/pspy | A tool to monitor Linux processes without root permissions | 4,960 |
publiclab/mapknitter | A tool for combining and preparing aerial images for mapping purposes | 267 |
projectdiscovery/nuclei | A vulnerability scanner built on YAML templates to identify weaknesses in applications and networks. | 20,687 |
hackplayers/evil-winrm | A tool providing a custom WinRM interface for post-exploitation purposes in Windows environments | 4,537 |
htr-tech/zphisher | A phishing tool designed to simulate and educate about online security threats | 11,467 |
putoutjs/printer | Prints JavaScript code from Babel AST to human-readable format | 16 |
gwen001/pentest-tools | A collection of custom security tools and scripts for performing various forms of network enumeration, vulnerability testing, and information gathering. | 3,152 |