pen-testing
There are 26 repositories under pen-testing topic.
king04aman/KeyLogger
A keylogger, sometimes called a keystroke logger or keyboard capture, is a type of surveillance technology used to monitor and record each keystroke on a specific computer. Keylogger software is also available for use on smartphones, such as the Apple iPhone and Android devices.
pretext-project/pretext-project.github.io
Open-Source Collection of Social Engineering Pretexts
Am0rphous/Awesome
Awesome collection of resources 😎 Work in progress🔥
trailofbits/tacklebox
Phishing Toolkit
Packet-Batch/old-dpdk
Packet Batch's old DPDK program. An application that utilizes the DPDK to send network packets. Used for penetration testing including Denial of Service (DoS), and network monitoring.
PhilipMur/Password-Cracker
A simple C# md5 hash password cracker using wordlists , A Console application.
CS4Usama/Programming-Helpful-Material
Different Programming Books and Helpful Material for Developers
postworthy/ExploitableApp
A .NET core project for web based pen testing
proditis/orunmila
a simple tool to refine and produce lists for your bugbounty and pen-test engagements
andreashappe/offensivegraphs
Playground for using (initially) langchain/langgraph for security testing.
GainSec/Hackers-LunchBox
High level attack and finding maps for all your penetration testing, hacking, bug bounty and red teaming needs!
tajiknomi/tcpHostCLI_windows
Simple TCP Server to handle multiple reverse connection/sessions
FilipRokita/AntiCCScam
AntiCCScam is a Python script that combats credit card fraud by sending fake data to scam websites, disrupting their malicious operations. This tool generates and automates the flooding of scam sites with random credit card information for educational and ethical purposes.
PhilipMur/C-Sharp-SlowLoris-v2.0
C# Slowloris type Http Post Pen Test Tool
sondrekulseng/aircrack.sh
A script based on the aircrack-ng package. Used to simplify network penetration testing.
b0rdst31n/SbleedyGonzales
SbleedyGonzales is a flexible framework designed for testing vulnerabilities in Bluetooth BR/EDR and LE. It aids in identifying both existing and emerging security issues in Bluetooth-enabled devices, making it a valuable tool for vulnerability research, penetration testing, and Bluetooth security assessments.
CJanecka/Projects_and_CTFs
Welcome to my portfolio showcase, a reflection of my journey in the dynamic realm of digital security. I am dedicated to upholding the highest standards of professionalism and expertise. This page serves as a testament to my growth through various Projects and Capture the Flag (CTF) challenges.
realblonde48tree/Burp-Suite-Pro-Installer-2025
Burp Suite Pro for web security testing and penetration testing. Analyze and identify vulnerabilities in web applications. 🔍💻
azurespheredev/the-book-of-secret-knowledge
A collection of inspiring lists, manuals, cheatsheets, blogs, hacks, one-liners, cli/web tools and more.
labex-labs/kali-server-exploitation-in-action
Kali Server Exploitation in Action | This repo collects 20 of programming labs exercises for Kali Server Exploitation in Action. This course covers penetration testing and ethical hacking with Kali Linux. Key topics include exploiting vulnerabilities via Metasploit, scanning and exploiting networ...
labex-labs/kali-web-application-attacks-in-action
Kali Web Application Attacks in Action | This repo collects 2 of programming labs exercises for Kali Web Application Attacks in Action. In this course, you will learn how to perform web application attacks using Kali Linux. Topics covered include web penetration testing, discovering web vulnerabi...
labex-labs/privilege-escalation-techniques-on-linux
Privilege Escalation Techniques on Linux | This repo collects 11 of programming labs exercises for Privilege Escalation Techniques on Linux. In this course, you will learn about privilege escalation techniques on Linux. It is a beginner level course and will cover various techniques to escalate p...
labex-labs/web-vulnerability-mastery
Web Vulnerability Mastery | This repo collects 8 of programming labs exercises for Web Vulnerability Mastery. In this course, you will learn about the most common web vulnerabilities and how to exploit them. You will learn about SQL Injection, File Inclusion, Cross-Site Scripting (XSS), File Uplo...
PyDever/kwaf
simple WAF security tester and bypasser
usethisname1419/Base64-hash
tool for helping testing IDOR with base64 numbers hashed