BishopFox / public-pentesting-reportsLinks
Curated list of public penetration test reports released by several consulting firms and academic security groups
☆19Updated 4 years ago
Alternatives and similar repositories for public-pentesting-reports
Users that are interested in public-pentesting-reports are comparing it to the libraries listed below
Sorting:
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 4 years ago
- List of Repositories☆102Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- Dictionary cracking tool for HTTP Digest challenge/response hashes☆32Updated 2 years ago
- A collection of tools to find data that has been made public in cloud storage systems such as S3 Buckets and Digital Ocean Spaces☆82Updated 3 months ago
- ☆156Updated 2 months ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆45Updated 5 years ago
- ☆36Updated 2 years ago
- Protocol agnostic online password guessing API.☆85Updated 2 years ago
- This script is a multi-threaded Okta password sprayer.☆71Updated 2 years ago
- ☆80Updated 6 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆190Updated 2 years ago
- Lookup for interesting stuff in SMB shares☆151Updated 2 years ago
- Open-Source Collection of Social Engineering Pretexts☆142Updated 2 years ago
- Automatically run and save ffuf scans for multiple IPs☆81Updated last year
- ☆49Updated 4 months ago
- NessusV2 File Parser☆69Updated 3 years ago
- Oh-my-zsh theme for pentesters which includes the date, time, and IP address for pentest logging.☆47Updated 2 years ago
- A CLI tool to identify the hash type of a given hash.☆113Updated 3 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆121Updated 3 years ago
- Resolves an IP address to the cloud provider it is hosted on☆101Updated this week
- Get GTFOBins info about a given exploit from the command line☆39Updated last year
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- Scrape, Hunt, and Transform names and usernames☆126Updated 3 years ago
- Functions that can be used to gain Reverse Shells with PowerShell☆83Updated 3 years ago
- recon-ng modules for Censys☆37Updated 2 years ago
- m0chan.github.io☆88Updated 4 months ago
- credshed - a scalable database for credential leaks. Written in Python, it can easily ingest poorly-formatted files or entire directorie…☆64Updated 4 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆146Updated 2 years ago