☆60Oct 9, 2023Updated 2 years ago
Alternatives and similar repositories for Facial-Recognition-PenTest-Checklist
Users that are interested in Facial-Recognition-PenTest-Checklist are comparing it to the libraries listed below
Sorting:
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆16Jun 9, 2023Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Jun 18, 2023Updated 2 years ago
- this nuclei template finds back up files☆22Aug 25, 2025Updated 6 months ago
- Challenge Python☆19Apr 26, 2023Updated 2 years ago
- Cipher Suite Checker☆12Mar 22, 2023Updated 2 years ago
- Hack The Box OSCP-like VMs writeups☆11Oct 11, 2020Updated 5 years ago
- ☆11May 30, 2021Updated 4 years ago
- Exploits made practicing for OSCE☆23Dec 3, 2020Updated 5 years ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆23Apr 30, 2023Updated 2 years ago
- Smart and efficient tool to automate open redirect detection at scale.☆10Mar 21, 2022Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆12Jul 19, 2020Updated 5 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- ☆244Jan 23, 2025Updated last year
- ☆78Apr 25, 2023Updated 2 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- LLM Vulnerable Application☆13Aug 19, 2023Updated 2 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Comprehensive adversary emulation tool for security testing on Google Cloud Platform (GCP) environments.☆14Jun 14, 2024Updated last year
- Automated tool for domains & Subdomains Gathering☆14Updated this week
- MalBox is a quick and dirty setup to create a malware analysis VM☆14Aug 27, 2024Updated last year
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- CATANA - CUT your Wordlist!☆16Oct 2, 2022Updated 3 years ago
- Argus is used to test for Blind XSS and SSRF vulnerbilities or any sort of OOB detection☆13Nov 1, 2024Updated last year
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆13Jun 4, 2022Updated 3 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆61Jun 28, 2020Updated 5 years ago
- Open Source Intelligence (OSINT) Tool List for Cyber Threat Intelligence Researchers☆22May 4, 2024Updated last year
- Dump paths & pages from Next.js Manifest☆15Mar 19, 2024Updated last year
- CVE-2024-50603: Aviatrix Controller Unauthenticated Command Injection☆17Jan 12, 2025Updated last year
- ☆317Jul 6, 2024Updated last year
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago
- Collection of templates from various resources☆43Dec 5, 2025Updated 2 months ago
- Smarter Asset Search, Faster Information Extraction ZoomEye GPT is a browser extension designed specifically for cybersecurity profession…☆24Apr 30, 2025Updated 10 months ago
- Open Penetration Testing Bookmarks Collection☆19Jun 9, 2015Updated 10 years ago
- Script to Automate installtion of Apps ,frida server and moving Burpsuite certificate to root folder☆268Jan 28, 2024Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆19Apr 30, 2020Updated 5 years ago
- ☆42Dec 24, 2024Updated last year
- Xssor.go is a xss reflections checker for urls☆71Mar 22, 2023Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- ☆173Nov 20, 2025Updated 3 months ago