Edr4 / SHSLinks
SCIENCE, HACKING AND SECURITY
☆13Updated 3 years ago
Alternatives and similar repositories for SHS
Users that are interested in SHS are comparing it to the libraries listed below
Sorting:
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆42Updated 6 months ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆82Updated 2 weeks ago
- Pentest/Red Team: Resources, repos and scripts.☆72Updated 3 weeks ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 8 months ago
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆139Updated 2 years ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆66Updated this week
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆79Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 6 months ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆145Updated 10 months ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆15Updated 3 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆91Updated last year
- Making your own CTF☆26Updated 4 years ago
- ☆65Updated 2 years ago
- Red Teaming tools and techniques☆53Updated 2 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated 11 months ago
- Chrome extension tool for OSINT & Recon☆55Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated 11 months ago
- ☆44Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆162Updated 4 months ago
- CTF writeups - Tryhackme, HackTheBox, Vulnhub☆40Updated 4 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆73Updated 6 months ago
- ☆98Updated 4 years ago
- Automate Scoping, OSINT and Recon assessments.☆95Updated 7 months ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago