pen-testing
There are 27 repositories under pen-testing topic.
king04aman/KeyLogger
A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
pretext-project/pretext-project.github.io
Open-Source Collection of Social Engineering Pretexts
Am0rphous/Awesome
Awesome collection of resources 😎 Work in progress🔥
trailofbits/tacklebox
Phishing Toolkit
Packet-Batch/old-dpdk
Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including Denial of Service (DoS), and network monitoring.
PhilipMur/Password-Cracker
A simple C# md5 hash password cracker using wordlists , A Console application.
CS4Usama/Programming-Helpful-Material
Different Programming Books and Helpful Material for Developers
postworthy/ExploitableApp
A .NET core project for web based pen testing
proditis/orunmila
a simple tool to refine and produce lists for your bugbounty and pen-test engagements
andreashappe/offensivegraphs
Playground for using (initially) langchain/langgraph for security testing.
GainSec/Hackers-LunchBox
High level attack and finding maps for all your penetration testing, hacking, bug bounty and red teaming needs!
tajiknomi/tcpHostCLI_windows
Simple TCP Server to handle multiple reverse connection/sessions
b0rdst31n/SbleedyGonzales
SbleedyGonzales is a flexible framework designed for testing vulnerabilities in Bluetooth BR/EDR and LE. It aids in identifying both existing and emerging security issues in Bluetooth-enabled devices, making it a valuable tool for vulnerability research, penetration testing, and Bluetooth security assessments.
FilipRokita/AntiCCScam
AntiCCScam is a Python script that combats credit card fraud by sending fake data to scam websites, disrupting their malicious operations. This tool generates and automates the flooding of scam sites with random credit card information for educational and ethical purposes.
PhilipMur/C-Sharp-SlowLoris-v2.0
C# Slowloris type Http Post Pen Test Tool
Soumyo001/offensive_powershell
this repo contains some of my payloads collection.
sondrekulseng/aircrack.sh
A script based on the aircrack-ng package. Used to simplify network penetration testing.
CJanecka/Projects_and_CTFs
Welcome to my portfolio showcase, a reflection of my journey in the dynamic realm of digital security. I am dedicated to upholding the highest standards of professionalism and expertise. This page serves as a testament to my growth through various Projects and Capture the Flag (CTF) challenges.
realblonde48tree/Burp-Suite-Pro-Installer-2025
Burp Suite Pro for web security testing and penetration testing. Analyze and identify vulnerabilities in web applications. 🔍💻
azurespheredev/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
labex-labs/kali-server-exploitation-in-action
This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting network services, brute-forcing remote access, developing custom scanners, attacking vulnerabilities like IngressLock, Samba, and Unreal IRCd, creating malicious PDFs, and privilege esc...
labex-labs/kali-web-application-attacks-in-action
[Archived] Kali Web Application Attacks in Action | This repo collects 2 of programming labs exercises for Kali Web Application Attacks in Action. In this course, you will learn how to perform web application attacks using Kali Linux. Topics covered include web penetration testing, discovering we...
labex-labs/privilege-escalation-techniques-on-linux
In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate privileges on Linux systems.
labex-labs/web-vulnerability-mastery
In this course, you will learn about the most common web vulnerabilities and how to exploit them. You will learn about SQL Injection, File Inclusion, Cross-Site Scripting (XSS), File Upload, Command Injection, and Directory Traversal vulnerabilities. You will also learn how to exploit these vulnerabilities using various techniques and tools.
PyDever/kwaf
simple WAF security tester and bypasser
usethisname1419/Base64-hash
tool for helping testing IDOR with base64 numbers hashed