Edr4 / SHSLinks
SCIENCE, HACKING AND SECURITY
☆12Updated 3 years ago
Alternatives and similar repositories for SHS
Users that are interested in SHS are comparing it to the libraries listed below
Sorting:
- Making your own CTF☆26Updated 4 years ago
- A summary of the most abbreviations I encountered so far☆22Updated 2 weeks ago
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A simple pentest container equipped with common python pentest tools.☆41Updated 4 months ago
- Red Teaming tools and techniques☆52Updated 2 years ago
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated 2 years ago
- Challenge Python☆19Updated 2 years ago
- ☆25Updated 2 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- SidePeek.js is a curated set of JavaScript payloads for browser-based recon. Run them in DevTools or as bookmarklets to uncover hidden AP…☆19Updated last month
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆28Updated last year
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 9 months ago
- Repository to put my notes related to OSCP certification☆19Updated 5 years ago
- A curated list wordlists for bruteforcing and fuzzing☆82Updated 2 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆75Updated last year
- Hacking Notes☆33Updated 7 months ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Collection of some pentesting and bugbounty resources☆43Updated 3 years ago
- Generate email permutations from a name and verify if this email exist with different providers (gmail, duckduckgo, yahoo, yandex)☆41Updated 4 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 6 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆64Updated 4 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 11 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Updated 3 years ago
- Root-me & CTFlearn Challenges☆7Updated 3 years ago
- ☆18Updated 2 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆27Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago