A collection of more than 170+ tools, scripts, cheatsheets and other loots that I've developed over years for Red Teaming/Pentesting/IT Security audits purposes. https://mgeeky.tech/
Go to file
2021-03-29 13:13:37 +02:00
clouds/aws Fix 2020-06-19 14:31:53 +02:00
file-formats Added tamperUpx.py 2021-01-04 12:19:54 -08:00
linux Update prepare-kali.sh 2020-05-25 16:46:18 +02:00
networks Update IBM-MQ-Pentesting-notes.md 2020-04-08 13:41:46 +02:00
others Added more commands. 2021-03-26 20:05:36 +01:00
red-teaming C3-Client: README updated. 2021-03-29 13:13:37 +02:00
web Updated proxy2 2020-07-31 13:03:04 +02:00
windows Added CobaltSplunk 2021-03-15 02:33:37 +01:00
.gitmodules Added CobaltSplunk 2021-03-15 02:33:37 +01:00
README.md README 2020-05-14 14:01:05 +02:00

A collection of my Penetration Testing Tools, Scripts, Cheatsheets

This is a collection of more than a 140+ tools, scripts, cheatsheets and other loots that I've been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.

Notice: In order to clone this repository properly - use --recurse-submodules switch:

bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools

Most of these files were initially shared on my Gists but eventually got moved into this repository.

Every time I stumbled upon a problem that could be better scripted or resolved programatically - I made effort to do just that and thus improve my technical assurance capabilities or to optimize time spent on repetitive actions during projects I've been delivering.

The collection is divided further onto following sections:

  • clouds - Tools I came up with during my cloud assessments
  • file-formats - file-format related utilities, fuzzers and alike.
  • linux - small bunch of Linux-based scripts and tools.
  • networks - Network devices & protocols Penetration Testing toolery
  • others - Others related somehow to this craftmanship
  • red-teaming - Lots of toolings I've been using during my Purple/Red-Teaming engagements
  • web - Web applications security assessment related utilities.
  • windows - Windows goodies, scripts, exploits.

The base of these tools do not contain any customer/client related sensitive information as well as there are no engagement-specific tools developed as PoCs.

Mariusz B. / mgeeky, (@mariuszbit)
<mb [at] binary-offensive.com>