0x25 / usefulLinks
useful pentest note
☆66Updated last week
Alternatives and similar repositories for useful
Users that are interested in useful are comparing it to the libraries listed below
Sorting:
- Penetration Testing Playbook (PTP)☆175Updated 6 years ago
- DEPRECATED - A wrapper around gobuster that automatically scans newly discovered directories.☆116Updated 4 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆57Updated 7 years ago
- Red Teaming :: Penetration Testing :: Offensive Security :: OSCP :: OSCE :: CheatSheets :: Tools :: etc...☆146Updated 6 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- A place to store my own wordlists, and link to others that are useful☆108Updated last year
- Notes/Tools for pentesting☆82Updated last year
- 🏰 A Python script for AWS S3 bucket enumeration.☆144Updated 2 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆60Updated 6 years ago
- Pentesting/Bugbounty Dockerfiles.☆177Updated 4 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆103Updated last year
- Automatically exported from code.google.com/p/fuzzdb☆63Updated 3 years ago
- How to prepare for OSCP complete guide☆128Updated 5 years ago
- ☆47Updated 5 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆157Updated 5 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆137Updated 5 years ago
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆124Updated 5 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 5 years ago
- vulnerable single sign on☆148Updated 11 months ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆133Updated 3 weeks ago
- Asynchronous wordlist based DKIM scanner☆58Updated 4 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆105Updated 2 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆78Updated 6 years ago
- Custom tools and projects about security☆110Updated 4 years ago
- ☆94Updated 7 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆43Updated 4 years ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- subdomain bruteforce list☆101Updated 9 months ago
- Words list generator to crack security tokens☆110Updated 5 years ago