All Projects → G123N1NJ4 → C2hack

G123N1NJ4 / C2hack

C2Hack, sharing tips and tricks for pentesters

Programming Languages

python
139335 projects - #7 most used programming language

Labels

Projects that are alternatives of or similar to C2hack

Feroxbuster
A fast, simple, recursive content discovery tool written in Rust.
Stars: ✭ 1,314 (+959.68%)
Mutual labels:  pentest
Hacker Container
Container with all the list of useful tools/commands while hacking and pentesting Kubernetes Clusters
Stars: ✭ 105 (-15.32%)
Mutual labels:  pentest
Sippts
Set of tools to audit SIP based VoIP Systems
Stars: ✭ 116 (-6.45%)
Mutual labels:  pentest
Web Brutator
Fast Modular Web Interfaces Bruteforcer
Stars: ✭ 97 (-21.77%)
Mutual labels:  pentest
Keye
Keye is a reconnaissance tool that was written in Python with SQLite3 integrated. After adding a single URL, or a list of URLs, it will make a request to these URLs and try to detect changes based on their response's body length.
Stars: ✭ 101 (-18.55%)
Mutual labels:  pentest
Bruteforce Http Auth
Bruteforce HTTP Authentication
Stars: ✭ 107 (-13.71%)
Mutual labels:  pentest
Pentest Guide
Penetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+961.29%)
Mutual labels:  pentest
Ssrf Testing
SSRF (Server Side Request Forgery) testing resources
Stars: ✭ 1,718 (+1285.48%)
Mutual labels:  pentest
Collection Document
Collection of quality safety articles. Awesome articles.
Stars: ✭ 1,387 (+1018.55%)
Mutual labels:  pentest
Vulrec
Vulnerability Recurrence:漏洞复现记录
Stars: ✭ 109 (-12.1%)
Mutual labels:  pentest
Ssrfmap
Automatic SSRF fuzzer and exploitation tool
Stars: ✭ 1,344 (+983.87%)
Mutual labels:  pentest
Wsmanager
Webshell Manager
Stars: ✭ 99 (-20.16%)
Mutual labels:  pentest
Owtf
Offensive Web Testing Framework (OWTF), is a framework which tries to unite great tools and make pen testing more efficient http://owtf.org https://twitter.com/owtfp
Stars: ✭ 1,516 (+1122.58%)
Mutual labels:  pentest
Pentest dic
自己收集整理自用的字典
Stars: ✭ 96 (-22.58%)
Mutual labels:  pentest
Shodan Dorks
Dorks for shodan.io. Some basic shodan dorks collected from publicly available data.
Stars: ✭ 118 (-4.84%)
Mutual labels:  pentest
Robustpentestmacro
This is a rich-featured Visual Basic macro code for use during Penetration Testing assignments, implementing various advanced post-exploitation techniques.
Stars: ✭ 95 (-23.39%)
Mutual labels:  pentest
Dllpasswordfilterimplant
DLL Password Filter Implant with Exfiltration Capabilities
Stars: ✭ 107 (-13.71%)
Mutual labels:  pentest
Purplecloud
An Infrastructure as Code (IaC) deployment of a small Active Directory pentest lab in the cloud. The deployment simulates a semi-realistic corporate enterprise Active Directory with a DC and endpoints. Purple team goals include blue team detection capabilities and R&D for detection engineering new approaches.
Stars: ✭ 122 (-1.61%)
Mutual labels:  pentest
Defaultcreds Cheat Sheet
One place for all the default credentials to assist the Blue/Red teamers activities on finding devices with default password 🛡️
Stars: ✭ 1,949 (+1471.77%)
Mutual labels:  pentest
Catnip
Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux
Stars: ✭ 108 (-12.9%)
Mutual labels:  pentest
                    ('-. .-.   ('-.               .-. .-')   
                   ( OO )  /  ( OO ).-.           \  ( OO )  
   .-----. .-----. ,--. ,--.  / . --. /   .-----. ,--. ,--.  
  '  .--.// ,-.   \|  | |  |  | \-.  \   '  .--./ |  .'   /  
  |  |('-.'-'  |  ||   .|  |.-'-'  |  |  |  |('-. |      /,  
 /_) |OO  )  .'  / |       | \| |_.'  | /_) |OO  )|     ' _) 
 ||  |`-'| .'  /__ |  .-.  |  |  .-.  | ||  |`-'| |  .   \   
(_'  '--'\|       ||  | |  |  |  | |  |(_'  '--'\ |  |\   \  
   `-----'`-------'`--' `--'  `--' `--'   `-----' `--' '--'  

After several years of performing penetration tests, here is my list of tips and tricks. This repository is for educational purpose and helping others penetration testers. Any malicious usage if strictly forbidden.

Here, you will find some kind of Cheat sheets and example commands for specific technologies. This repository will not contain any long text in order to explain how technologies works. It assumes that the reader already has some knowledge on technical basics.

Now you can see to hack, HF.

 knock, knock, Neo.

                (`.         ,-,
                ` `.    ,;' /
                 `.  ,'/ .'
                  `. X /.'
        .-;--''--.._` ` (
      .'            /   `
     ,           ` '   Q '
     ,         ,   `._    \
  ,.|         '     `-.;_'
  :  . `  ;    `  ` --,.._;
   ' `    ,   )   .'
      `._ ,  '   /_
         ; ,''-,;' ``-
          ``-..__``--`
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].