Skip to content
View peteneve's full-sized avatar

Block or report peteneve

Block user

Prevent this user from interacting with your repositories and sending you notifications. Learn more about blocking users.

You must be logged in to block users.

Please don't include any personal information such as legal names or email addresses. Maximum 100 characters, markdown supported. This note will be visible to only you.
Report abuse

Contact GitHub support about this user’s behavior. Learn more about reporting abuse.

Report abuse
43 stars written in Python
Clear filter

the only cheat sheet you need

Python 39,035 1,809 Updated Feb 1, 2025

Impacket is a collection of Python classes for working with network protocols.

Python 13,974 3,645 Updated Feb 27, 2025

SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.

Python 13,869 2,382 Updated Dec 15, 2024

Web path scanner

Python 12,626 2,352 Updated Feb 20, 2025

CTF framework and exploit development library

Python 12,387 1,741 Updated Mar 3, 2025

E-mails, subdomains and names Harvester - OSINT

Python 12,152 2,098 Updated Mar 3, 2025

Credentials recovery project

Python 9,822 2,049 Updated Feb 15, 2025

An open-source post-exploitation framework for students, researchers and developers.

Python 9,103 2,137 Updated Jan 1, 2025

A swiss army knife for pentesting networks

Python 8,611 1,657 Updated Dec 6, 2023

Count the number of people around you 👨‍👨‍👦 by monitoring wifi signals 📡

Python 6,938 383 Updated Aug 17, 2024

Hide screen when boss is approaching.

Python 6,232 1,083 Updated Oct 31, 2018

Web application fuzzer

Python 6,082 1,387 Updated Aug 18, 2024

Open Source Vulnerability Management Platform

Python 5,233 940 Updated Jan 30, 2025

P4wnP1 is a highly customizable USB attack platform, based on a low cost Raspberry Pi Zero or Raspberry Pi Zero W.

Python 4,144 667 Updated Aug 12, 2024

IntelOwl: manage your Threat Intelligence at scale

Python 4,046 468 Updated Mar 6, 2025

Unicorn is a simple tool for using a PowerShell downgrade attack and inject shellcode straight into memory. Based on Matthew Graeber's powershell attacks and the powershell bypass technique present…

Python 3,797 815 Updated Jan 24, 2024

An #OSINT Framework to perform various recon techniques on Companies, People, Phone Number, Bitcoin Addresses, etc., aggregate all the raw data, and give data in multiple formats.

Python 3,081 432 Updated May 23, 2020

UAC bypass, Elevate, Persistence methods

Python 2,657 385 Updated Feb 13, 2023

Know the dangers of credential reuse attacks.

Python 2,046 413 Updated Oct 14, 2024

Wiki-like CTF write-ups repository, maintained by the community. 2014

Python 1,835 641 Updated Apr 27, 2016

Find interesting Amazon S3 Buckets by watching certificate transparency logs.

Python 1,762 208 Updated Feb 28, 2025

Sniffs sensitive data from interface or pcap

Python 1,732 439 Updated Nov 2, 2023

Scripts to make password spraying attacks against Lync/S4B, OWA & O365 a lot quicker, less painful and more efficient

Python 1,479 268 Updated Oct 17, 2022

Pop shells like a master.

Python 1,451 236 Updated Apr 2, 2019

A tool to analyze multi-byte xor cipher

Python 1,422 174 Updated May 9, 2023

A framework that create an advanced stealthy dropper that bypass most AVs and have a lot of tricks

Python 1,399 377 Updated Nov 3, 2018

Security Tool to Look For Interesting Files in S3 Buckets

Python 1,390 245 Updated Apr 10, 2024

PLEASE USE NEW VERSION: https://github.com/kgretzky/evilginx2

Python 1,140 266 Updated Feb 6, 2022

LinkedIn Recon Tool

Python 1,135 205 Updated Mar 6, 2023

Steal Net-NTLM Hash using Bad-PDF

Python 1,095 219 Updated Aug 19, 2020
Next