All Projects β†’ bt3gl β†’ Pentesting_toolkit

bt3gl / Pentesting_toolkit

Licence: mit
πŸ΄β€β˜ οΈ Tools for pentesting, CTFs & wargames. πŸ΄β€β˜ οΈ

Programming Languages

c
50402 projects - #5 most used programming language

Projects that are alternatives of or similar to Pentesting toolkit

Cloakify
CloakifyFactory - Data Exfiltration & Infiltration In Plain Sight; Convert any filetype into list of everyday strings, using Text-Based Steganography; Evade DLP/MLS Devices, Defeat Data Whitelisting Controls, Social Engineering of Analysts, Evade AV Detection
Stars: ✭ 1,136 (-10.41%)
Mutual labels:  hacking, cryptography, pentesting, infosec, steganography
Infosec reference
An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.
Stars: ✭ 4,162 (+228.23%)
Mutual labels:  hacking, pentesting, infosec, forensics, reverse-engineering
Ctf Tools
Useful CTF Tools
Stars: ✭ 190 (-85.02%)
Mutual labels:  cryptography, ctf, forensics, reverse-engineering
Security Tools
Collection of small security tools, mostly in Bash and Python. CTFs, Bug Bounty and other stuff.
Stars: ✭ 509 (-59.86%)
Mutual labels:  hacking, pentesting, infosec, ctf
Stegcloak
Hide secrets with invisible characters in plain text securely using passwords πŸ§™πŸ»β€β™‚οΈβ­
Stars: ✭ 2,379 (+87.62%)
Mutual labels:  hacking, cryptography, infosec, steganography
Rebel Framework
Advanced and easy to use penetration testing framework πŸ’£πŸ”Ž
Stars: ✭ 183 (-85.57%)
Mutual labels:  hacking, ctf, forensics, reverse-engineering
Packetwhisper
PacketWhisper: Stealthily exfiltrate data and defeat attribution using DNS queries and text-based steganography. Avoid the problems associated with typical DNS exfiltration methods. Transfer data between systems without the communicating devices directly connecting to each other or to a common endpoint. No need to control a DNS Name Server.
Stars: ✭ 405 (-68.06%)
Mutual labels:  hacking, cryptography, pentesting, steganography
Ciphey
⚑ Automatically decrypt encryptions without knowing the key or cipher, decode encodings, and crack hashes ⚑
Stars: ✭ 9,116 (+618.93%)
Mutual labels:  hacking, cryptography, pentesting, ctf
Juice Shop
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Stars: ✭ 6,270 (+394.48%)
Mutual labels:  hacking, pentesting, ctf
Red Teaming Toolkit
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Stars: ✭ 5,615 (+342.82%)
Mutual labels:  hacking, pentesting, infosec
Gtfonow
Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries
Stars: ✭ 68 (-94.64%)
Mutual labels:  pentesting, ctf, post-exploitation
Dumpsterfire
"Security Incidents In A Box!" A modular, menu-driven, cross-platform tool for building customized, time-delayed, distributed security events. Easily create custom event chains for Blue- & Red Team drills and sensor / alert mapping. Red Teams can create decoy incidents, distractions, and lures to support and scale their operations. Build event sequences ("narratives") to simulate realistic scenarios and generate corresponding network and filesystem artifacts.
Stars: ✭ 775 (-38.88%)
Mutual labels:  hacking, pentesting, infosec
Covertutils
A framework for Backdoor development!
Stars: ✭ 424 (-66.56%)
Mutual labels:  pentesting, post-exploitation, steganography
Passphrase Wordlist
Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords
Stars: ✭ 556 (-56.15%)
Mutual labels:  hacking, pentesting, infosec
Hacker Roadmap
πŸ“Œ Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+511.36%)
Mutual labels:  hacking, vulnerabilities, post-exploitation
Name That Hash
πŸ”— Don't know what type of hash it is? Name That Hash will name that hash type! πŸ€– Identify MD5, SHA256 and 3000+ other hashes β˜„ Comes with a neat web app πŸ”₯
Stars: ✭ 540 (-57.41%)
Mutual labels:  hacking, infosec, ctf
Pentestkit
Useful tools and scripts during Penetration Testing engagements
Stars: ✭ 463 (-63.49%)
Mutual labels:  network, hacking, pentesting
Dirsearch
Web path scanner
Stars: ✭ 7,246 (+471.45%)
Mutual labels:  hacking, pentesting, infosec
Write Ups
πŸ“š VoidHack CTF write-ups
Stars: ✭ 45 (-96.45%)
Mutual labels:  cryptography, ctf, reverse-engineering
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (-31.39%)
Mutual labels:  hacking, pentesting, infosec

Pentesting Toolkit

Hi, I am Mia von Steinkirch, and this repository contains the resouces I used when I was a professional CTF player in 2014 and 2015.

Disclaimer:

All information and software available on this site are for educational purposes only. Use these at your own discretion, the site owners cannot be held responsible for any damages caused. The views expressed on this site are our own and do not necessarily reflect those of our employers.

Usage of all tools on this site for attacking targets without prior mutual consent is illegal. It is the end user’s responsibility to obey all applicable local, state and federal laws. We assume no liability and are not responsible for any misuse or damage caused by this site.

This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.


Sub-directories:


Resources

General Hacking

Privilege Escalation

Post-Exploitation

Books


Note that the project description data, including the texts, logos, images, and/or trademarks, for each open source project belongs to its rightful owner. If you wish to add or remove any projects, please contact us at [email protected].