7RU7H / ArchiveLinks
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
☆74Updated last week
Alternatives and similar repositories for Archive
Users that are interested in Archive are comparing it to the libraries listed below
Sorting:
- RedTeam - Red Team Tools☆47Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated last year
- 「🧱」Test a list of payloads and see if you can bypass it☆61Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- APK Infrastructure Investigator☆65Updated 2 years ago
- Kali Packerge Manager☆65Updated last year
- Find Email Spoofing Vulnerablity of domains☆97Updated last year
- ☆43Updated 5 months ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 9 months ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆28Updated 9 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- Yet Another PHP Shell - The most complete PHP reverse shell☆82Updated 3 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Red Teaming tools and techniques☆53Updated 2 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Mass bruteforce authentication of common services with common credentials.☆49Updated last year
- Subtron is a professional-grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆23Updated last month
- A simple pentest container equipped with common python pentest tools.☆42Updated 7 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated 2 years ago
- Web Path Finder☆61Updated last year
- Simple recon tool automates your recon process☆17Updated 2 years ago
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆142Updated 3 years ago
- Pivot your way deeper into computer networks with SSH compromised machines.☆62Updated 2 years ago
- simple recon tool to help you for searching vulnerability on web server☆73Updated 7 months ago
- Bash script for CTF automating basic enumeration☆43Updated 3 years ago