A collection of more than 140+ tools, scripts, cheatsheets and other loots that I have developed over years for Red Teaming/Pentesting/IT Security audits purposes. Most of them came handy on at least one of my real-world engagements.
A collection of my Penetration Testing Tools, Scripts, Cheatsheets
This is a collection of more than a 140+ tools, scripts, cheatsheets and other loots that I’ve been developing over years for Penetration Testing and IT Security audits purposes. Most of them came handy at least once during my real-world engagements.
Notice: In order to clone this repository properly – use
bash$ git clone --recurse-submodules https://github.com/mgeeky/Penetration-Testing-Tools
Most of these files were initially shared on my Gists but eventually got moved into this repository.
Every time I stumbled upon a problem that could be better scripted or resolved programatically – I made effort to do just that and thus improve my technical assurance capabilities or to optimize time spent on repetitive actions during projects I’ve been delivering.
The collection is divided further onto following sections:
clouds– Tools I came up with during my cloud assessments
file-formats– file-format related utilities, fuzzers and alike.
linux– small bunch of Linux-based scripts and tools.
networks– Network devices & protocols Penetration Testing toolery
others– Others related somehow to this craftmanship
red-teaming– Lots of toolings I’ve been using during my Purple/Red-Teaming engagements
web– Web applications security assessment related utilities.
windows– Windows goodies, scripts, exploits.
The base of these tools do not contain any customer/client related sensitive information as well as there are no engagement-specific tools developed as PoCs.
This and other projects are outcome of sleepless nights and plenty of hard work. If you like what I do and appreciate that I always give back to the community, Consider buying me a coffee (or better a beer) just to say thank you!
Mariusz B. / mgeeky, (@mariuszbit)
<mb [at] binary-offensive.com>