Personal pentest notes and playbooks<3
☆33Jan 7, 2026Updated 2 months ago
Alternatives and similar repositories for Pentest-References
Users that are interested in Pentest-References are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- An ongoing & curated collection of awesome vulnerability scanning software, libraries and frameworks, best guidelines, technical resource…☆14Feb 7, 2022Updated 4 years ago
- Welcome to my GitHub repository housing comprehensive handwritten notes from the IBM Cybersecurity Analyst Professional certification. Di…☆23Feb 27, 2024Updated 2 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆72Dec 19, 2022Updated 3 years ago
- Cybersecurity Resources☆322May 25, 2025Updated 9 months ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆90Oct 9, 2024Updated last year
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆62Jan 6, 2023Updated 3 years ago
- This repository is aimed to contain all basic tools and resources for cybersecurity. In this repository you will get all material which y…☆72Oct 25, 2024Updated last year
- 🎓 Path to a free self-taught education in Computer Science!☆76Mar 1, 2017Updated 9 years ago
- Source code for 'Pointers in C' by Hrishikesh Dewan and Naveen Toppo☆15Sep 30, 2020Updated 5 years ago
- Powerful tool that guesses the email of aged accounts via the "password reset" option at Instagram. This allows you to find the potential…☆13Aug 1, 2021Updated 4 years ago
- Some basic info, resources, and code snippets about windows kernel exploitation☆17Jul 18, 2025Updated 8 months ago
- 针对0基础新手编写的网络安全入门指南☆60Jun 13, 2023Updated 2 years ago
- A tool to find sensitive Keys and Passwords in your cookies, A reference guide on how to exploit them.☆19Oct 19, 2020Updated 5 years ago
- A Flexible, Modular ML Experiment Framework☆12Jan 22, 2020Updated 6 years ago
- 🍒 Share self-destructing encrypted notes☆26Jun 23, 2022Updated 3 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆10Feb 22, 2024Updated 2 years ago
- A scraper for the receive-smss.com service☆13Mar 4, 2026Updated 3 weeks ago
- Collection of all courses, and their materials, attended at Politecnico di Milano during both Bachelor level degree and Master level degr…☆27Feb 8, 2021Updated 5 years ago
- 📧 Python script to forward emails using Gmail.☆10Apr 4, 2023Updated 2 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆227Jan 27, 2025Updated last year
- Python-based vulnerability detection tool for web applications☆18Jul 31, 2024Updated last year
- BASIC interpreter - fetch and run classic BASIC programs☆23Jun 10, 2018Updated 7 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆13Feb 19, 2021Updated 5 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- In this repository, B.Sc. in Computer Science & Engineering courses and topics. Here some of my completed courses slide, assignment, hand…☆11May 31, 2025Updated 9 months ago
- Forwards messages via SMS from and to instant messengers (Telegram, Signal,..)☆13Oct 28, 2022Updated 3 years ago
- Devices on the local network can be added as a 'thing' in the Candle Controller / WebThings Gateway. Automations can then respond to thei…☆12Feb 9, 2026Updated last month
- ☆10May 6, 2017Updated 8 years ago
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- 25.11.2021 Siber Güvenlik İçin Python Eğitiminde Yazılan Kodlar☆13Nov 25, 2021Updated 4 years ago
- Cross platform Agile Data Analytics for .NET☆23Updated this week
- BTK Akademi Siber Güvenlik Operasyonları Eğitimi Materyalleri☆17Jun 5, 2024Updated last year
- All crack email (yahoospambox:hotmai) ...... created by mohammad && arman☆10Sep 5, 2020Updated 5 years ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 9 months ago
- 😈D3FACER is an auto-defacer used for defacing a lot of website in no time.☆20Jul 12, 2023Updated 2 years ago
- a python script which asks you for login and ask any other email_id . it downloads all attachments of inbox came from that other email_i…☆11Dec 22, 2017Updated 8 years ago
- The Vulnerability Assessment project aims to identify and address security vulnerabilities in a Windows 10 virtual machine (VM). Using N…☆18Mar 4, 2024Updated 2 years ago
- Site-Scanner - Web application vulnerability assessment tool.☆50Jul 30, 2024Updated last year