Pentesting Tools

Penetration Testing Tools – For Educational And Ethical Use

This repository contains a collection of tools and resources for penetration testing and security research. This repository is intended solely…

4 months ago

AWS – Amazon Web Services

Elastic Kubernetes Service (EKS) is a managed kubernetes offering by AWS. Discover how to harness the power of Amazon Web Services…

5 months ago

Kubernetes – Standard Cluster

If you are already having a Kubernetes standard vanilla cluster environment and wanted to set up Kubernetes Goat, then you…

5 months ago

CloudBrute – Unleashing Automated Security Testing Across Multiple Cloud Platforms

A tool to find a company (target) infrastructure, files, and apps on the top cloud providers (Amazon, Google, Microsoft, DigitalOcean,…

5 months ago

Volana – Mastering Stealth Command Execution During Penetration Testin

During pentest, an important aspect is to be stealth. For this reason you should clear your tracks after your passage. Nevertheless, many…

5 months ago

GCPwn – A Comprehensive Tool For GCP Security Testing

gcpwn was a tool built by myself while trying to learn GCP and leverages the newer GRPC client libraries created by google. It consists…

5 months ago

Unbekannt Framework – The Comprehensive Hacking And Pentesting Suite For Windows

The Linux version is no longer supported! The last Linux version is 6.0 that you find inside this repository. The…

7 months ago

MNSAllTools – The Ultimate Collection Of 350+ Hacking Resources For Cybersecurity Professionals

A collection of 350+ hacking tools you can install into termux for hacking, Pentesting, Mapping and more. In this tool…

7 months ago

X-hackz : Your Gateway To Advanced Hacking Tools

"X-hackz" is a multifaceted toolkit designed for hacking enthusiasts and cybersecurity learners. It offers a range of functions from social…

7 months ago

Zero-E : The Ultimate Automated Network Enumeration Tool For Effortless Security Auditing

Host discovery and service enumeration are part of every network pentest and routine check. It's relatively straightforward, and we could…

8 months ago