A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes. https://mgeeky.tech/
Go to file
2021-05-25 11:49:02 +02:00
clouds/aws Fix 2020-06-19 14:31:53 +02:00
file-formats readmes changed 2021-05-16 23:46:19 +02:00
linux Update prepare-kali.sh 2020-05-25 16:46:18 +02:00
networks readmes changed 2021-05-16 23:46:19 +02:00
others readmes changed 2021-05-16 23:46:19 +02:00
red-teaming updated bloodhound queries 2021-05-25 11:49:02 +02:00
web readmes changed 2021-05-16 23:46:19 +02:00
windows Updated UnhookMe and PE-Library 2021-05-25 02:47:24 +02:00
.gitmodules Removed malleable_redirector\proxy2 2021-05-16 01:19:52 +02:00
README.md README 2020-05-14 14:01:05 +02:00

A collection of my Penetration Testing Tools, Scripts, Cheatsheets

This is a collection of more than a 140+ tools, scripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.

Notice: In order to clone this repository properly - use --recurse-submodules switch:

bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools

Most of these files were initially shared on my Gists but eventually got moved into this repository.

Every time I stumbled upon a problem that could be better scripted or resolved programatically - I made effort to do just that and thus improve my technical assurance capabilities or to optimize time spent on repetitive actions during projects I've been delivering.

The collection is divided further onto following sections:

  • clouds - Tools I came up with during my cloud assessments
  • file-formats - file-format related utilities, fuzzers and alike.
  • linux - small bunch of Linux-based scripts and tools.
  • networks - Network devices & protocols Penetration Testing toolery
  • others - Others related somehow to this craftmanship
  • red-teaming - Lots of toolings I've been using during my Purple/Red-Teaming engagements
  • web - Web applications security assessment related utilities.
  • windows - Windows goodies, scripts, exploits.

The base of these tools do not contain any customer/client related sensitive information as well as there are no engagement-specific tools developed as PoCs.

Mariusz B. / mgeeky, (@mariuszbit)
<mb [at] binary-offensive.com>