1
0
mirror of https://github.com/mgeeky/Penetration-Testing-Tools.git synced 2024-12-22 17:15:06 +01:00
mgeeky-Penetration-Testing-.../README.md

41 lines
2.1 KiB
Markdown
Raw Normal View History

2020-05-14 14:01:05 +02:00
## A collection of my Penetration Testing Tools, Scripts, Cheatsheets
2018-02-02 22:22:43 +01:00
2021-10-17 15:30:55 +02:00
This is a collection of more than a **160+** tools, scripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes.
2020-05-14 14:00:13 +02:00
Most of them came handy at least once during my real-world engagements.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
**Notice:** In order to clone this repository properly - use `--recurse-submodules` switch:
2019-01-29 14:04:33 +01:00
```
bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools
```
2020-05-14 14:00:13 +02:00
Most of these files were initially shared on my [Gists](https://gist.github.com/mgeeky) but eventually got moved into this repository.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
Every time I stumbled upon a problem that could be better scripted or resolved programatically - I made effort to do just that and thus improve my technical assurance capabilities or to optimize time spent on repetitive actions during projects I've been delivering.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
The collection is divided further onto following sections:
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
- `clouds` - Tools I came up with during my cloud assessments
- `file-formats` - file-format related utilities, fuzzers and alike.
- `linux` - small bunch of Linux-based scripts and tools.
- `networks` - Network devices & protocols Penetration Testing toolery
- `others` - Others related somehow to this craftmanship
2021-10-17 15:30:55 +02:00
- `phishing` - Scripts and tools used to deliver Phishing Awareness and Red Team simulations
2020-05-14 14:01:05 +02:00
- `red-teaming` - Lots of toolings I've been using during my Purple/Red-Teaming engagements
2020-05-14 14:00:13 +02:00
- `web` - Web applications security assessment related utilities.
- `windows` - Windows goodies, scripts, exploits.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
The base of these tools do not contain any customer/client related sensitive information as well as there are no engagement-specific tools developed as PoCs.
2021-09-28 10:57:13 +02:00
---
2021-09-28 10:53:19 +02:00
2021-09-28 11:04:07 +02:00
### ☕ Show Support ☕
2021-09-28 10:57:13 +02:00
2021-09-28 11:04:07 +02:00
This and other projects are outcome of sleepless nights and **plenty of hard work**. If you like what I do and appreciate that I always give back to the community,
2021-09-28 11:02:47 +02:00
[Consider buying me a coffee](https://github.com/sponsors/mgeeky) _(or better a beer)_ just to say thank you! 💪
2021-09-28 10:57:13 +02:00
---
2021-09-28 10:53:19 +02:00
2020-05-14 14:00:13 +02:00
```
Mariusz B. / mgeeky, (@mariuszbit)
<mb [at] binary-offensive.com>
```