All Projects → tasooshi → Pentesting Cookbook

tasooshi / Pentesting Cookbook

A set of recipes useful in pentesting and red teaming scenarios

Programming Languages

powershell
5483 projects

Projects that are alternatives of or similar to Pentesting Cookbook

Mxtract
mXtract - Memory Extractor & Analyzer
Stars: ✭ 499 (+508.54%)
Mutual labels:  security-tools, pentesting, redteam
Awesome Mobile Security
An effort to build a single place for all useful android and iOS security related stuff. All references and tools belong to their respective owners. I'm just maintaining it.
Stars: ✭ 1,837 (+2140.24%)
Mutual labels:  security-tools, pentesting, redteam
Diamorphine
LKM rootkit for Linux Kernels 2.6.x/3.x/4.x/5.x (x86/x86_64 and ARM64)
Stars: ✭ 725 (+784.15%)
Mutual labels:  security-tools, pentesting, redteam
Cheatsheet God
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Stars: ✭ 3,521 (+4193.9%)
Mutual labels:  cheatsheet, security-tools, pentesting
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+365.85%)
Mutual labels:  security-tools, pentesting, redteam
Impost3r
👻Impost3r -- A linux password thief
Stars: ✭ 355 (+332.93%)
Mutual labels:  security-tools, pentesting, redteam
Nimscan
🚀 Fast Port Scanner 🚀
Stars: ✭ 134 (+63.41%)
Mutual labels:  security-tools, pentesting, redteam
Fireelf
fireELF - Fileless Linux Malware Framework
Stars: ✭ 435 (+430.49%)
Mutual labels:  security-tools, pentesting, redteam
Stowaway
👻Stowaway -- Multi-hop Proxy Tool for pentesters
Stars: ✭ 500 (+509.76%)
Mutual labels:  security-tools, pentesting, redteam
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (+845.12%)
Mutual labels:  security-tools, pentesting
Sprayingtoolkit
Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient
Stars: ✭ 802 (+878.05%)
Mutual labels:  security-tools, pentesting
Venom
Venom - A Multi-hop Proxy for Penetration Testers
Stars: ✭ 1,228 (+1397.56%)
Mutual labels:  pentesting, redteam
Perun
Perun是一款主要适用于乙方安服、渗透测试人员和甲方RedTeam红队人员的网络资产漏洞扫描器/扫描框架
Stars: ✭ 773 (+842.68%)
Mutual labels:  pentesting, redteam
Evillimiter
Tool that monitors, analyzes and limits the bandwidth of devices on the local network without administrative access.
Stars: ✭ 764 (+831.71%)
Mutual labels:  security-tools, pentesting
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+960.98%)
Mutual labels:  cheatsheet, pentesting
Social Analyzer
API, CLI & Web App for analyzing & finding a person's profile across +1000 social media \ websites (Detections are updated regularly by automated systems)
Stars: ✭ 8,449 (+10203.66%)
Mutual labels:  pentesting, security-tools
Dirhunt
Find web directories without bruteforce
Stars: ✭ 983 (+1098.78%)
Mutual labels:  security-tools, pentesting
Exploitpack
Exploit Pack -The next generation exploit framework
Stars: ✭ 728 (+787.8%)
Mutual labels:  security-tools, pentesting
Ksubdomain
无状态子域名爆破工具
Stars: ✭ 976 (+1090.24%)
Mutual labels:  security-tools, pentesting
Pentesting Bible
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
Stars: ✭ 8,981 (+10852.44%)
Mutual labels:  pentesting, redteam

░▒▓ pentesting-cookbook ▓▒░

A set of recipes useful in pentesting and red teaming scenarios

Snippets, code samples and hints used in penetration tests stored in a single repository so it can be quickly accessed and searched during the assessments.

Structure

  • bin Handy utilities to be run locally
  • snippets All things useful to be run remotely, code snippets, examples etc
  • Notes.* All sort of helpers, lists and notes not necessarily related to specific service or stage
  • Target.Host.OS.* - Things that can be done once foothold is established
  • Target.Host.Service.* - Commands useful in enumeration and exploitation of particular service
  • Target.Network.* - Commands related to scanning and moving around networks
  • Target.Recon.* - Typical recon like DNS enumeration, OSINT etc.

Formatting rules

  • If there are more than three levels of hierarchy the file needs to be split.
  • Sources (scripts) are located in the snippets directory (referenced by @).
  • Conventions:
    • ~ commands
    • @ file references
    • - lists
    • -- comments (above the commented line)
    • OS specific commands:
      • ~$ (Linux, defaults to Bash)
      • ~# (Linux - root required)
      • ~> (Windows)
    • Shell specific commands:
      • ~PS> (Powershell)
  • Variables:
    • VAR_ATTACKER_HOST
    • VAR_ATTACKER_PORT
    • VAR_TARGET_DOMAIN
    • VAR_TARGET_HOST
    • VAR_TARGET_PORT
    • VAR_TARGET_CIDR
    • VAR_TARGET_RANGE
    • VAR_TARGET_FILE
    • VAR_USERNAME
    • VAR_PASSWORD
    • VAR_HASH
    • VAR_STRING
    • VAR_INTEGER
    • VAR_HEX
    • VAR_WORDLIST
    • VAR_*_HOST (VAR_FTP_HOST, VAR_ZOMBIE_HOST, VAR_PROXY_HOST etc)
Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].