pentest-tools | A collection of custom security tools for quick needs | Security Testing library
kandi X-RAY | pentest-tools Summary
kandi X-RAY | pentest-tools Summary
Custom pentesting tools
Support
Quality
Security
License
Reuse
Top functions reviewed by kandi - BETA
- Test if the given IP address is a CloudFlare 2
- Compute the similarity score of a response
- Checks if ip is a cloudflare2 address
- Convert an IP address to an integer
- Downloads oject
- Download a file
- Save the given content to the given directory
- Performs a google search query
- Decode HTML
- Extract data from t_json
- List deep links
- Display a type O
- Grab all subdomains from crt sh
- Check issue status
- Save ALT to file
- List providers
- Read the infos
- List all active activities
- Grab ip from Censys
- List services
- List all registered receivers
- Print usage information
- List all files in src directory
- Print banner
- Prints the progress bar
- Display the type QM
pentest-tools Key Features
pentest-tools Examples and Code Snippets
-------------------------------------------------------------------------------------
| Global Option |
------------------------------------------------------
$ ./sometools.sh list
# In order, columns are: ID, category name and tool name
[1] Evasion/Bashfuscator
[2] Evasion/PyFuscation
[3] Evasion/tvasion
[4] Evasion/unicorn
[5] Exploit-Win/windows-kernel-exploits
[6] PrivEsc-Lin/BeRoot
[7] PrivEsc-Lin/Li
# Inital setup. Should be the first command
$ ./sometools.sh setup
# List all available tools
$ ./sometools.sh list
# List all available tools of a category
$ ./sometools.sh list-cat Utilities
# List install tool(s)
$ ./sometools.sh list-installed
#
Community Discussions
Trending Discussions on pentest-tools
QUESTION
I ran a Pentest-Tools security audit on my website and am getting a warning that the "django_language" is missing flags "Secure, HttpOnly". I'm not really even sure what this cookie is or where it's set, but would like to clear these errors.
I set the following in the settings.py
file, but to no affect
ANSWER
Answered 2019-Apr-04 at 21:46Your warning is asking not to allow javascript to have access to the CSRF cookie (client-side) Try this.
Community Discussions, Code Snippets contain sources that include Stack Exchange Network
Vulnerabilities
No vulnerabilities reported
Install pentest-tools
You can use pentest-tools like any standard Python library. You will need to make sure that you have a development environment consisting of a Python distribution including header files, a compiler, pip, and git installed. Make sure that your pip, setuptools, and wheel are up to date. When using pip it is generally recommended to install packages in a virtual environment to avoid changes to the system.
Support
Reuse Trending Solutions
Find, review, and download reusable Libraries, Code Snippets, Cloud APIs from over 650 million Knowledge Items
Find more librariesStay Updated
Subscribe to our newsletter for trending solutions and developer bootcamps
Share this Page