Edr4 / SHSLinks
SCIENCE, HACKING AND SECURITY
☆13Updated 3 years ago
Alternatives and similar repositories for SHS
Users that are interested in SHS are comparing it to the libraries listed below
Sorting:
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆67Updated 2 weeks ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last week
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆147Updated 11 months ago
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆43Updated last week
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆126Updated last year
- CTF and Bug Bounty Hunting WriteUps.☆21Updated this week
- Sub-Domain TakeOver Vulnerability Scanner (edoardottt fork)☆69Updated 7 months ago
- Red Teaming tools and techniques☆54Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 7 months ago
- ☆21Updated 3 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 9 months ago
- SubEvil is an advanced open source intelligence framework (OSINT) for grouping subdomains.☆111Updated 2 years ago
- Config files for my GitHub profile.☆28Updated 2 years ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆141Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- Brute forcing login pages with SQL Injection queries with cURL☆20Updated last year
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆40Updated 4 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆73Updated 4 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆44Updated 7 months ago
- Chrome extension tool for OSINT & Recon☆55Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆76Updated 7 months ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆26Updated 5 months ago
- SQLMutant is a powerful SQL injection testing tool that includes both passive and active reconnaissance processes for any given domain. I…☆155Updated 9 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆83Updated this week
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆98Updated 2 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 weeks ago
- ☆78Updated 2 years ago