7RU7H / ArchiveLinks
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
☆75Updated this week
Alternatives and similar repositories for Archive
Users that are interested in Archive are comparing it to the libraries listed below
Sorting:
- Find Email Spoofing Vulnerablity of domains☆98Updated last year
- RedTeam - Red Team Tools☆47Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- 「🧱」Test a list of payloads and see if you can bypass it☆60Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆106Updated last year
- A collection of pentesting web scanners☆33Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 9 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆20Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- DNSrecon tool with GUI for Kali Linux☆60Updated 2 years ago
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆73Updated 6 months ago
- ☆43Updated 4 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 9 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 9 months ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago
- APK Infrastructure Investigator☆64Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆48Updated last year
- Kali Packerge Manager☆65Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A BASH Script to automate the installation of the most popular bug bounty tools☆21Updated 11 months ago
- Highly customizable low-interaction experimental honeypot that mimics specific hosts.☆34Updated 2 weeks ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 2 weeks ago
- Web Hacking and Red Teaming MindMap☆77Updated last month