Personal pentest notes and playbooks<3
☆33Jan 7, 2026Updated 3 months ago
Alternatives and similar repositories for Pentest-References
Users that are interested in Pentest-References are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- CyberSecurity Resources and Tools☆30Jun 24, 2024Updated last year
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆90Oct 9, 2024Updated last year
- Read and Write files as root in neovim☆12Mar 28, 2026Updated 2 weeks ago
- A collection of awesome tools, software, libraries, learning tutorials & videos, frameworks, best practices and technical resources abou…☆62Jan 6, 2023Updated 3 years ago
- Source code for 'Pointers in C' by Hrishikesh Dewan and Naveen Toppo☆15Sep 30, 2020Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Powerful tool that guesses the email of aged accounts via the "password reset" option at Instagram. This allows you to find the potential…☆13Aug 1, 2021Updated 4 years ago
- ☆13May 29, 2018Updated 7 years ago
- https://www.nu11secur1ty.com☆23Feb 15, 2026Updated last month
- SOC bilgileri yer almaktadır.☆22Jul 2, 2025Updated 9 months ago
- A tool to find sensitive Keys and Passwords in your cookies, A reference guide on how to exploit them.☆19Oct 19, 2020Updated 5 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- This Is A Python Script That Forwards SMS Messages To A Discord Webhook☆11Feb 22, 2024Updated 2 years ago
- ☆10Oct 3, 2019Updated 6 years ago
- Solutions for problems of ICPC regionals, mainly west african national contests and South Africa regional☆12Jul 20, 2024Updated last year
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- A scraper for the receive-smss.com service☆13Mar 26, 2026Updated 2 weeks ago
- 📧 Python script to forward emails using Gmail.☆10Apr 4, 2023Updated 3 years ago
- Welcome Cybersecurity's World. An ongoing & curated collection of awesome software best practices and techniques, libraries and framework…☆229Jan 27, 2025Updated last year
- Most powerfull Wifi Jammier.with fixes.☆13Oct 14, 2022Updated 3 years ago
- CVE-2022-24990 TerraMaster TOS unauthenticated RCE via PHP Object Instantiation☆14Apr 25, 2022Updated 3 years ago
- Basic password cracker. These tools can be used to crack various types of password hashes, the program applies the technique to recover t…☆10Mar 22, 2023Updated 3 years ago
- Advanced Hunting Queries☆20Mar 18, 2026Updated 3 weeks ago
- In this repository, B.Sc. in Computer Science & Engineering courses and topics. Here some of my completed courses slide, assignment, hand…☆11May 31, 2025Updated 10 months ago
- Source Code for 'Pointers in C Programming' by Thomas Mailund☆24Apr 26, 2021Updated 4 years ago
- Managed Kubernetes at scale on DigitalOcean • AdDigitalOcean Kubernetes includes the control plane, bandwidth allowance, container registry, automatic updates, and more for free.
- Code and notes regarding Malware Development☆11Oct 30, 2022Updated 3 years ago
- ☆20Dec 23, 2023Updated 2 years ago
- AI-powered cybersecurity chatbot designed to provide helpful and accurate answers to your cybersecurity-related queries and also do code …☆347Feb 21, 2026Updated last month
- A Python script to create an administrator account on Joomla! 1.6/1.7/2.5 using a privilege escalation vulnerability☆22Feb 11, 2025Updated last year
- LSP Server for providing linting and autocompletion inside of git commit messages☆42Feb 7, 2026Updated 2 months ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Educational repository with source code examples☆12Jun 3, 2025Updated 10 months ago
- Burp suite - Python☆19Nov 2, 2018Updated 7 years ago
- Site-Scanner - Web application vulnerability assessment tool.☆50Jul 30, 2024Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Kunj Mehta's Portfolio☆11Jan 20, 2025Updated last year
- Vulnerable Windows Application for Pentesters from the house of DarkRelay Security Labs. The project is along the lines of DVWA, AWSGoat …☆14Dec 28, 2023Updated 2 years ago
- One of the best Grabbers to get the Passwords, Cookies and tokens from your friends ;)☆10Aug 29, 2023Updated 2 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- Ransomware Detection Test PowerShell Script☆11Sep 22, 2017Updated 8 years ago
- It uploads user photos without user permission to server☆15Oct 7, 2018Updated 7 years ago
- anything I find interesting regarding reverse engineering☆13May 7, 2017Updated 8 years ago