A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes. https://mgeeky.tech/
Go to file
2020-05-19 11:19:49 -04:00
clouds/aws Update evaluate-iam-role.sh 2020-04-15 12:40:42 +02:00
file-formats First 2018-02-02 22:22:43 +01:00
linux Added code-exec-templates and some additions to rogue-dot-net 2020-05-07 01:42:52 +02:00
networks Update IBM-MQ-Pentesting-notes.md 2020-04-08 13:41:46 +02:00
others fixed readme 2020-03-04 16:54:15 +01:00
red-teaming updated stracciatella 2020-05-19 11:19:49 -04:00
web Updated proxy2 2020-02-20 15:10:57 +01:00
windows README 2020-05-14 13:32:28 +02:00
.gitmodules Added mention of my SharpWMI fork 2020-05-07 01:41:48 +02:00
README.md README 2020-05-14 14:01:05 +02:00

A collection of my Penetration Testing Tools, Scripts, Cheatsheets

This is a collection of more than a 140+ tools, scripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.

Notice: In order to clone this repository properly - use --recurse-submodules switch:

bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools

Most of these files were initially shared on my Gists but eventually got moved into this repository.

Every time I stumbled upon a problem that could be better scripted or resolved programatically - I made effort to do just that and thus improve my technical assurance capabilities or to optimize time spent on repetitive actions during projects I've been delivering.

The collection is divided further onto following sections:

  • clouds - Tools I came up with during my cloud assessments
  • file-formats - file-format related utilities, fuzzers and alike.
  • linux - small bunch of Linux-based scripts and tools.
  • networks - Network devices & protocols Penetration Testing toolery
  • others - Others related somehow to this craftmanship
  • red-teaming - Lots of toolings I've been using during my Purple/Red-Teaming engagements
  • web - Web applications security assessment related utilities.
  • windows - Windows goodies, scripts, exploits.

The base of these tools do not contain any customer/client related sensitive information as well as there are no engagement-specific tools developed as PoCs.

Mariusz B. / mgeeky, (@mariuszbit)
<mb [at] binary-offensive.com>