CaseAnon / DumpLinks
Knowledge is power
☆89Updated 7 years ago
Alternatives and similar repositories for Dump
Users that are interested in Dump are comparing it to the libraries listed below
Sorting:
- yotter - bash script that performs recon and then uses dirb to discover directories that might lead to information leakage☆124Updated 7 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- Miscellaneous pentesting scripts for OSCP☆58Updated 6 years ago
- The Collective. A repo for a collection of red team and/or pen test projects found mostly on Github. https://github.com/ceramicskate0/The…☆35Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A simple tool for offline searching of default credentials for network devices, web applications and more.☆167Updated 7 years ago
- ☆28Updated 6 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- ☆151Updated last year
- ☆92Updated 6 years ago
- Linux pentest tools☆88Updated 5 years ago
- Penetration testing scripts☆143Updated 7 years ago
- Penetration Testing/Security Cheatsheets☆191Updated 9 years ago
- So many people in Information Security create resources for students transitioning into the industry, but the struggle is to share them t…☆54Updated 7 years ago
- Tool made to automate tasks of pentesting.☆165Updated 5 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- Database of websites for penetration testing☆174Updated 5 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆95Updated 6 years ago
- Bash script purposed for system enumeration, vulnerability identification and privilege escalation.☆166Updated 5 years ago
- ☆26Updated 7 years ago
- search for hosts info with shodan☆230Updated 3 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- Phishing application to aid in sending emails more simply and allowing for more control over settings.☆102Updated 8 years ago
- Linux bash tool for Enumeration & Privilege Escalation☆56Updated 5 years ago
- Plugin for keepnote to import a XML nmap file☆27Updated 8 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- ☆51Updated 8 years ago
- Windows Remote Post Breach Tool via Telegram☆133Updated 7 years ago