pentest-tool
Here are 363 public repositories matching this topic...
Fully automated offensive security framework for reconnaissance and vulnerability scanning
-
Updated
Jul 25, 2020 - Python
OneForAll是一款功能强大的子域收集工具
-
Updated
Sep 17, 2020 - Python
The LAZY script will make your life easier, and of course faster.
-
Updated
Jul 8, 2020 - Shell
A high performance offensive security tool for reconnaissance and vulnerability scanning
-
Updated
Mar 5, 2020 - Python
XSS'OR - Hack with JavaScript.
-
Updated
Aug 19, 2020 - JavaScript
An advanced web directory & file scanning tool that will be more powerful than DirBuster, Dirsearch, cansina, and Yu Jian.一个高级web目录、文件扫描工具,功能将会强于DirBuster、Dirsearch、cansina、御剑。
-
Updated
Oct 18, 2019 - Python
SSRF (Server Side Request Forgery) testing resources
-
Updated
Sep 5, 2020 - Python
Nuclei is a fast tool for configurable targeted scanning based on templates offering massive extensibility and ease of use.
-
Updated
Sep 17, 2020 - Go
iOS/macOS/Linux Remote Administration Tool
-
Updated
Dec 7, 2019 - Objective-C
Gives you one-liners that aids in penetration testing operations, privilege escalation and more
-
Updated
Apr 23, 2020 - Python
I have been using this tool for awhile and i noticed 50% of the results are false positive. for i,e after cloudflair dump a list of ip addresses for the site origin server it can't detect which one is working so i after i take those ip addresses i test them manually on the both ports 443 & 80 some they work on 443 port and some they only work at 80 port.
Thank you so much for this amazing tool
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
-
Updated
Aug 26, 2020 - Python
Penetration Testing Platform
-
Updated
Jun 21, 2020 - Python
Venom - A Multi-hop Proxy for Penetration Testers
-
Updated
Oct 14, 2019 - Go
Passhunt is a simple tool for searching of default credentials for network devices, web applications and more. Search through 523 vendors and their 2084 default passwords.
-
Updated
Dec 23, 2018 - Python
-
Updated
Dec 11, 2019 - HTML
Automation for internal Windows Penetrationtest / AD-Security
-
Updated
Sep 10, 2020 - PowerShell
ODAT: Oracle Database Attacking Tool
-
Updated
Sep 14, 2020 - Python
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo
-
Updated
Sep 10, 2020 - Shell
A runtime mobile application analysis toolkit with a Web GUI, powered by Frida, written in Python.
-
Updated
May 10, 2020 - JavaScript
Find exploit tool
-
Updated
Oct 3, 2018 - Python
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
-
Updated
May 27, 2020 - Python
Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
-
Updated
Apr 25, 2019 - Python
The all-in-one Red Team extension for Web Pentester
-
Updated
Sep 12, 2020 - JavaScript
pwncat - netcat on steroids with Firewall, IDS/IPS evasion, bind and reverse shell, self-injecting shell and port forwarding magic - and its fully scriptable with Python (PSE)
-
Updated
Aug 23, 2020 - Shell
Privilege Escalation Enumeration Script for Windows
-
Updated
Sep 16, 2020 - PowerShell
ERR qdisc root handle could not be created. maybe flush network settings (--flush).
Raspberry pi 3 with kali.
I did the --flush but still same error
Wordpress Attack Suite
-
Updated
Jul 30, 2018 - Python
MSDAT: Microsoft SQL Database Attacking Tool
-
Updated
Mar 25, 2020 - Python
Improve this page
Add a description, image, and links to the pentest-tool topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentest-tool topic, visit your repo's landing page and select "manage topics."


Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r