mirror of
				https://github.com/mgeeky/Penetration-Testing-Tools.git
				synced 2025-11-04 04:55:26 +01:00 
			
		
		
		
	Readme.
This commit is contained in:
		
							
								
								
									
										18
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							
							
						
						
									
										18
									
								
								.gitmodules
									
									
									
									
										vendored
									
									
								
							@@ -1,33 +1,33 @@
 | 
			
		||||
[submodule "web/tomcatWarDeployer"]
 | 
			
		||||
	path = web/tomcatWarDeployer
 | 
			
		||||
	url = git@github.com:mgeeky/tomcatWarDeployer.git
 | 
			
		||||
	url = https://github.com/mgeeky/tomcatWarDeployer.git
 | 
			
		||||
[submodule "social-engineering/VisualBasicObfuscator"]
 | 
			
		||||
	path = social-engineering/VisualBasicObfuscator
 | 
			
		||||
	url = git@github.com:mgeeky/VisualBasicObfuscator.git
 | 
			
		||||
	url = https://github.com/mgeeky/VisualBasicObfuscator.git
 | 
			
		||||
[submodule "social-engineering/RobustPentestMacro"]
 | 
			
		||||
	path = social-engineering/RobustPentestMacro
 | 
			
		||||
	url = git@github.com:mgeeky/RobustPentestMacro.git
 | 
			
		||||
	url = https://github.com/mgeeky/RobustPentestMacro.git
 | 
			
		||||
[submodule "web/burpContextAwareFuzzer"]
 | 
			
		||||
	path = web/burpContextAwareFuzzer
 | 
			
		||||
	url = git@github.com:mgeeky/burpContextAwareFuzzer.git
 | 
			
		||||
	url = https://github.com/mgeeky/burpContextAwareFuzzer.git
 | 
			
		||||
[submodule "web/dirbuster"]
 | 
			
		||||
	path = web/dirbuster
 | 
			
		||||
	url = git@github.com:mgeeky/dirbuster.git
 | 
			
		||||
	url = https://github.com/mgeeky/dirbuster.git
 | 
			
		||||
[submodule "social-engineering/PhishingPost"]
 | 
			
		||||
	path = social-engineering/PhishingPost
 | 
			
		||||
	url = git@github.com:mgeeky/PhishingPost.git
 | 
			
		||||
	url = https://github.com/mgeeky/PhishingPost.git
 | 
			
		||||
[submodule "web/arachni-launching-script"]
 | 
			
		||||
	path = web/arachni-launching-script
 | 
			
		||||
	url = git@github.com:mgeeky/arachni-launching-script.git
 | 
			
		||||
	url = https://github.com/mgeeky/arachni-launching-script.git
 | 
			
		||||
[submodule "red-teaming/RobustPentestMacro"]
 | 
			
		||||
	path = red-teaming/RobustPentestMacro
 | 
			
		||||
	url = https://github.com/mgeeky/RobustPentestMacro
 | 
			
		||||
[submodule "red-teaming/VisualBasicObfuscator"]
 | 
			
		||||
	path = red-teaming/VisualBasicObfuscator
 | 
			
		||||
	url = git@github.com:mgeeky/VisualBasicObfuscator.git
 | 
			
		||||
	url = https://github.com/mgeeky/VisualBasicObfuscator.git
 | 
			
		||||
[submodule "red-teaming/PhishingPost"]
 | 
			
		||||
	path = red-teaming/PhishingPost
 | 
			
		||||
	url = git@github.com:mgeeky/PhishingPost.git
 | 
			
		||||
	url = https://github.com/mgeeky/PhishingPost.git
 | 
			
		||||
[submodule "web/proxy2"]
 | 
			
		||||
	path = web/proxy2
 | 
			
		||||
	url = https://github.com/mgeeky/proxy2
 | 
			
		||||
 
 | 
			
		||||
@@ -2,6 +2,11 @@
 | 
			
		||||
 | 
			
		||||
This is a collection of many tools, scripts, cheatsheets and other loots that I've been developing over years for penetration testing and IT Security audits purposes. Many of them actually had been used during real-world assignments, some of them are a collection gathered from various sources (waiting to be used someday). 
 | 
			
		||||
 | 
			
		||||
**Notice:** In order to clone it properly - use `--recurse-submodules` option:
 | 
			
		||||
```
 | 
			
		||||
bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools
 | 
			
		||||
```
 | 
			
		||||
 | 
			
		||||
This repository does not contain actual exploits. These I will release under separate repository in some point in future.
 | 
			
		||||
 | 
			
		||||
Most of these files actually comes straight from my [Gists](https://gist.github.com/mgeeky) - I've decided to move them into separated repository as managmenet of this number of scripts became tough nut to crack.
 | 
			
		||||
@@ -16,4 +21,4 @@ This repository is divided further onto following directories:
 | 
			
		||||
- `web` - Web-Application auditing, pentesting, fuzzing related.
 | 
			
		||||
- `windows` - Windows utilities, scripts, exploits.
 | 
			
		||||
 | 
			
		||||
Of course these tools do not contain any customer/client related sensitive informations and there are no assignment-specific tools developed as PoCs. 
 | 
			
		||||
Of course these tools do not contain any customer/client related sensitive informations and there are no assignment-specific tools developed as PoCs. 
 | 
			
		||||
 
 | 
			
		||||
		Reference in New Issue
	
	Block a user