A penetration testing playbook that's suitable for CTF challenges, bug bounty hunting and red team assessments.
-
Updated
Jun 12, 2024 - C
A penetration testing playbook that's suitable for CTF challenges, bug bounty hunting and red team assessments.
Query the NetBIOS name tables for both the local computer and remote computers.
Powerful Keylogger Coded in C🔑, that collects exactly what the user types.
An application that utilizes the DPDK to send network packets. Used for penetration testing including Denial of Service (DoS), and network monitoring.
HeadHunter Command and Control (C2) Framework
A cheap "bad" USB using a Raspberry Pi Pico running on Lua.
Generate customised wordlist for penetration testing practice (e.g. brute force attack, dictionary attack, etc.)
An application that utilizes fast AF_XDP Linux sockets to generate and send network packets. Used for penetration testing including Denial of Service (DoS) and network monitoring.
Modular personalized dictionary generator.
Add a description, image, and links to the penetration-testing-tools topic page so that developers can more easily learn about it.
To associate your repository with the penetration-testing-tools topic, visit your repo's landing page and select "manage topics."