Skip to content
View peteneve's full-sized avatar

Block or report peteneve

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
43 stars written in Python
Clear filter

the only cheat sheet you need

Python 38,803 1,803 Updated Dec 31, 2024

Impacket is a collection of Python classes for working with network protocols.

Python 13,797 3,619 Updated Jan 9, 2025

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.

Python 13,527 2,337 Updated Dec 15, 2024

Web path scanner

Python 12,440 2,335 Updated Dec 20, 2024

CTF framework and exploit development library

Python 12,293 1,725 Updated Jan 15, 2025

E-mails, subdomains and names Harvester - OSINT

Python 11,826 2,062 Updated Jan 14, 2025

Credentials recovery project

Python 9,733 2,041 Updated Oct 18, 2024

An open-source post-exploitation framework for students, researchers and developers.

Python 9,039 2,127 Updated Jan 1, 2025

A swiss army knife for pentesting networks

Python 8,549 1,650 Updated Dec 6, 2023

Count the number of people around you 👨‍👨‍👦 by monitoring wifi signals 📡

Python 6,930 384 Updated Aug 17, 2024

Hide screen when boss is approaching.

Python 6,223 1,084 Updated Oct 31, 2018

Web application fuzzer

Python 6,024 1,382 Updated Aug 18, 2024

Open Source Vulnerability Management Platform

Python 5,157 930 Updated Jan 16, 2025

P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.

Python 4,104 663 Updated Aug 12, 2024

IntelOwl: manage your Threat Intelligence at scale

Python 3,939 452 Updated Jan 17, 2025

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,772 814 Updated Jan 24, 2024

An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.

Python 3,063 428 Updated May 23, 2020

UAC bypass, Elevate, Persistence methods

Python 2,647 384 Updated Feb 13, 2023

Know the dangers of credential reuse attacks.

Python 2,039 411 Updated Oct 14, 2024

Wiki-like CTF write-ups repository, maintained by the community. 2014

Python 1,833 641 Updated Apr 27, 2016

Find interesting Amazon S3 Buckets by watching certificate transparency logs.

Python 1,760 209 Updated Dec 7, 2022

Sniffs sensitive data from interface or pcap

Python 1,718 438 Updated Nov 2, 2023

Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient

Python 1,468 266 Updated Oct 17, 2022

Pop shells like a master.

Python 1,449 235 Updated Apr 2, 2019

A tool to analyze multi-byte xor cipher

Python 1,411 173 Updated May 9, 2023

A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks

Python 1,399 377 Updated Nov 3, 2018

Security Tool to Look For Interesting Files in S3 Buckets

Python 1,378 242 Updated Apr 10, 2024

LinkedIn Recon Tool

Python 1,129 202 Updated Mar 6, 2023

PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2

Python 1,123 264 Updated Feb 6, 2022

Steal Net-NTLM Hash using Bad-PDF

Python 1,084 218 Updated Aug 19, 2020
Next