Git Product home page Git Product logo

pentest-tools's Introduction

Pentest-Tools

Some random tools I use for penetration testing.

[ALPHA] - Development in progress.
[BETA] - Development completed but not extensively tested.

00 pwnbox

Scripts I use for the management of my pwnbox.

archive-projects.sh     - Archive all "Audit" folders (zip + delete folder if successful)
create-project.sh       - Create a new "Audit" project and populate it with default files and folders
htb-create-env.sh       - Create a new "HTB" project and populate it with default files and folders
htb-vpn.sh              - Connect to HTB VPN
pwnbox-install.sh       - Script to customize Kali Linux and add non-default tools
pwnbox-update.sh        - Script to automate the process of updating my pwnbox

01 recon

Helper tools for reconnaissance.

[BETA] CommandSuggester - Parse Nmap XML and generate an HTML report with recon commands to run
domains_in_scope.sh     - Check a list of domains names to see if they are in a given scope (IPv4 public subnets)

02 web

Custom tools for web application pentesting.

http-echo-server.py     - A python web server that prints the content of the requests it receives

03 internal

Various script for internal network pentesting.

access-point.sh         - Spawn a WPA2-PSK access point (also useful for mobile app pentesting)
pyweb.sh                - Wrapper around the python web server module
rsg.py                  - Generate reverse shell one liners for linux and windows
tschexec.py             - Impacket example script to exec commands on Windows remotely through the TSCH RPC interface

04 windows

Tools for Windows exploitation.

bindshell32.exe         - Windows Win32 bind shell executable - bindshell32.exe <LPORT>
bindshell64.exe         - Windows x64 bind shell executable - bindshell64exe <LPORT>
[BETA] Invoke-BooMiniDump.ps1 - Dump the memory of a process using MiniDumpWriteDump in Boolang
revshell32.exe          - Windows Win32 reverse shell executable - revshell32.exe <LHOST> <LPORT>
revshell64.exe          - Windows x64 reverse shell executable - revshell64.exe <LHOST> <LPORT>
[BETA] XpsPrinter.exe   - Loads the 'PrintConfig.dll' DLL as SYSTEM

XpsPrinter.exe

1. Overwrite C:\Windows\System32\DriverStore\FileRepository\prnms003.inf_amd64_xxxxxxxxxxxxxxxx\Amd64\PrintConfig.dll
2. Run XpsPrinter.exe

05 linux

Empty for now.

06 ad

Empty for now.

07 reverse

Custom reverse engineering tools.

oleview2cpp.py          - Convert the output of oleview to C++ code (deprecated)

pentest-tools's People

Contributors

itm4n avatar

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    ๐Ÿ–– Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. ๐Ÿ“Š๐Ÿ“ˆ๐ŸŽ‰

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google โค๏ธ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.