AmynaSec-Research-Labs / VahakaLinks
☆23Updated 7 months ago
Alternatives and similar repositories for Vahaka
Users that are interested in Vahaka are comparing it to the libraries listed below
Sorting:
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆25Updated 7 months ago
- Challenge Python☆19Updated 2 years ago
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- ☆24Updated 10 months ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- A simple pentest container equipped with common python pentest tools.☆42Updated last month
- ☆43Updated 7 months ago
- Enumeration & fingerprint tool☆24Updated last year
- CVE-2024-24919 [Check Point Security Gateway Information Disclosure]☆33Updated last year
- Tools used for Pentesting☆22Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆85Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated last year
- ☆15Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆78Updated last month
- OSCP Study Guide☆41Updated 3 years ago
- Bash script for CTF automating basic enumeration☆42Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆85Updated 2 years ago
- This project explores secure remote access using Metasploit's reverse TCP payloads. Ethically and responsibly, we showcase potential risk…☆29Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated last year
- This is an AD pentest tools collection☆59Updated last year
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆36Updated last year
- Unauthorized Access to Metadata and User Data like CTF☆28Updated last year
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆24Updated last year
- CTF and Bug Bounty Hunting WriteUps.☆21Updated last week
- This repository contains information on the CVEs I found.☆51Updated last year
- Red Teaming tools and techniques☆55Updated 2 years ago
- A Red Teaming tool focused on profiling the target.☆29Updated last week
- Minimal web server enumeration & attack surface detection tool based on results of nmap.☆38Updated last year