A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes. https://mgeeky.tech/
Go to file
2018-05-02 01:48:06 +02:00
file-formats First 2018-02-02 22:22:43 +01:00
linux First 2018-02-02 22:22:43 +01:00
networks Added HSRPFlooder. 2018-03-08 14:53:23 +01:00
others Readmes fixed. 2018-02-02 22:53:23 +01:00
social-engineering Updated submodules and added ysoserial-generator.py 2018-05-02 01:48:06 +02:00
web Updated submodules and added ysoserial-generator.py 2018-05-02 01:48:06 +02:00
windows Readmes fixed. 2018-02-02 22:53:23 +01:00
.gitmodules Added submodules 2018-02-02 22:40:00 +01:00
README.md First 2018-02-02 22:22:43 +01:00

Penetration Testing Tools, Scripts, CheatSheets

This is a collection of many tools, scripts, cheatsheets and other loots that I've been developing over years for penetration testing and IT Security audits purposes. Many of them actually had been used during real-world assignments, some of them are a collection gathered from various sources (waiting to be used someday).

This repository does not contain actual exploits. These I will release under separate repository in some point in future.

Most of these files actually comes straight from my Gists - I've decided to move them into separated repository as managmenet of this number of scripts became tough nut to crack.

This repository is divided further onto following directories:

  • file-formats - Contains various file-format related utilities, fuzzers and so on.
  • linux - Contains linux-based scripts for various purposes.
  • networks - Network devices & services Penetration Testing and auditing scripts
  • others - Others related somehow to penetration tests & Audits
  • social-engineering - Powershell, Visual Basic, js, phishings and other alike candys
  • web - Web-Application auditing, pentesting, fuzzing related.
  • windows - Windows utilities, scripts, exploits.

Of course these tools do not contain any customer/client related sensitive informations and there are no assignment-specific tools developed as PoCs.