mgeeky-Penetration-Testing-.../README.md

31 lines
1.7 KiB
Markdown
Raw Normal View History

2018-02-02 22:22:43 +01:00
## Penetration Testing Tools, Scripts, CheatSheets
2020-05-14 14:00:13 +02:00
This is a collection of more than a **140+** tools, scripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes.
Most of them came handy at least once during my real-world engagements.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
**Notice:** In order to clone this repository properly - use `--recurse-submodules` switch:
2019-01-29 14:04:33 +01:00
```
bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools
```
2020-05-14 14:00:13 +02:00
Most of these files were initially shared on my [Gists](https://gist.github.com/mgeeky) but eventually got moved into this repository.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
Every time I stumbled upon a problem that could be better scripted or resolved programatically - I made effort to do just that and thus improve my technical assurance capabilities or to optimize time spent on repetitive actions during projects I've been delivering.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
The collection is divided further onto following sections:
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
- `clouds` - Tools I came up with during my cloud assessments
- `file-formats` - file-format related utilities, fuzzers and alike.
- `linux` - small bunch of Linux-based scripts and tools.
- `networks` - Network devices & protocols Penetration Testing toolery
- `others` - Others related somehow to this craftmanship
- `red-teaming` - Lots of toolings I've been using during my Purpler/Red-Teaming engagements
- `web` - Web applications security assessment related utilities.
- `windows` - Windows goodies, scripts, exploits.
2018-02-02 22:22:43 +01:00
2020-05-14 14:00:13 +02:00
The base of these tools do not contain any customer/client related sensitive information as well as there are no engagement-specific tools developed as PoCs.
```
Mariusz B. / mgeeky, (@mariuszbit)
<mb [at] binary-offensive.com>
```