EdOverflow / hunter
Guidelines for writing secure code for Python developers.
☆20Updated 7 years ago
Alternatives and similar repositories for hunter:
Users that are interested in hunter are comparing it to the libraries listed below
- A static website template for security pages.☆50Updated 6 months ago
- A formula to calculate bounty amounts.☆14Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 6 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆22Updated last year
- PowerShell script to help with privilege escalation on a compromised Windows box.☆22Updated 6 years ago
- DPE - Default Password Enumeration☆34Updated 11 years ago
- ☆14Updated 6 years ago
- introduction to distributed scanning using vultr☆11Updated 7 years ago
- A wrap up script to auto perform nmap scan from the result of dnsrecon, then output result with filename as hostname and ip☆11Updated 6 years ago
- Compilation of commands, tips and scripts that helped me throughout Vulnhub, Hackthebox, OSCP and real scenarios☆14Updated 7 years ago
- Collection of scripts that I have used on Red Team engagements☆16Updated 7 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Learn the basics of cryptography throughout history.☆19Updated 4 years ago
- ☆18Updated last year
- ☆34Updated last month
- ☆28Updated 5 years ago
- A list of universities with vulnerability disclosure policies☆12Updated 4 years ago
- A collection of personal ZAP scripts☆14Updated last year
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆16Updated 5 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Personal repository with handy cheatsheets.☆15Updated 8 years ago
- Simple scripts aiding penetration testing process☆12Updated 5 years ago
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Updated 2 years ago
- Information-Gathering Shell Script☆29Updated 4 years ago