💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
-
Updated
Nov 14, 2025 - Python
💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh
All knowledge I gained from CTFs, real life penetration testing and learning by myself.
Penetration Testing AI Assistant based on open source LLMs.
ClatsCracker is a versatile Executable & Python based password-cracking tool supporting 25 hash algorithms. It offers dictionary or brute-force attacks, adjustable threads, salted hash verification, a user-friendly menu, and progress feedback—ensuring, efficient, ethical password testing. The exe version does not require Python. Just open it!
Python tool for detecting subdomain takeover vulnerabilities by resolving CNAME records and checking for known error messages. It supports bulk domain scanning and logs detailed results for analysis.
A guide to using Kali Linux tools for web penetration testing, ethical hacking, forensics, and bug bounty. Covers setup, key tools, methodologies, and best practices. Optimized for security professionals.
Red Team Arsenal - a comprehensive collection of tools, scripts, and techniques for conducting red team operations and adversary simulations, including custom beacons, malleable C2 profiles, aggressor scripts, advanced payload generation methods, as well as other evasion tools, tailored for red team operations and security research.
Offensive Security Scripts (OSS) - Repository of random scripts I've written for offensive purposes.
The VAPT Toolkit provides a streamlined way to install, configure, and maintain a complete penetration testing environment with over 50+ security tools organized across multiple categories on Ubuntu 22.
🕒 This repository contains the core source code and configuration files for the website. Feel free to modify, extend, and contribute to its development to improve functionality, add new features, and ensure the ongoing success of the project.
This repository is all about the POC and Tools that can be leveraged down for initial access in red teaming engagements.
All-in-One Master ASN Processing with 0x ASN Processor | CIDR, DNS, IP & Port Scanning Made Easy!
A keylogger designed for stealthy keystroke capture & analysis.
Security notes
THM DESCRIPTION: Get started with Cyber Security in 24 Days - Learn the basics by doing a new, beginner friendly security challenge every day leading up to Christmas.
A collection of awesome penetration testing and offensive cybersecurity resources.
Just like a ghost, Ghost_Dir is capable of detecting hidden subdirectories that other scanning tools may not be able to find. It acts silently, without leaving any traces, and is able to penetrate into obscure areas of the web page that usually go unnoticed.
A Robust, Single-Page Cheatsheet for Penetration Testers and Security Researchers. It organizes over 20 categories of essential command-line tools and techniques, from OSINT and Recon to deep Exploitation, Binary Reversing (Pwn), and Post-Exploitation. Designed for rapid, on-the-job reference, it emphasizes safe, responsible use in authorized test
This repository provides a comprehensive guide to network security and penetration testing. It covers VPN and DNS leak testing, passive network monitoring, network scanning, information gathering, and brute force methods. Aimed at ethical hackers and cybersecurity enthusiasts, it offers practical tools to secure networks and detect vulnerabilities.
AuthCrack is a Python-based brute-force login attack tool designed for ethical hacking and cybersecurity education, targeting self-hosted websites to highlight authentication flaws.
Add a description, image, and links to the penetrationtesting topic page so that developers can more easily learn about it.
To associate your repository with the penetrationtesting topic, visit your repo's landing page and select "manage topics."