Hacking-Notes / VulnScanLinks
Performing website vulnerability scanning using OpenAI technologie
☆67Updated 10 months ago
Alternatives and similar repositories for VulnScan
Users that are interested in VulnScan are comparing it to the libraries listed below
Sorting:
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆95Updated 4 months ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆30Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- OSCP preperation and HackTheBox write ups.☆60Updated 2 years ago
- ☆238Updated last year
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- A blind SQL injection brute forcer☆113Updated 9 months ago
- OWASP based Web Application Security Testing Checklist☆82Updated last year
- Red Team Guides☆144Updated 2 years ago
- Web Hacking and Red Teaming MindMap☆78Updated last month
- CHOMTE.SH is a powerful shell script designed to automate reconnaissance tasks during penetration testing. It utilizes various Go-based t…☆131Updated last year
- Automate Scoping, OSINT and Recon assessments.☆109Updated 2 weeks ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- All about Active Directory pentesting☆156Updated 5 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Find Email Spoofing Vulnerablity of domains☆96Updated last year
- Contains a collection of Bash scripts designed for comprehensive security audits and network mapping of Active Directory (AD) environment…☆144Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆27Updated 9 months ago
- A wordlist generator tool, that allows you to supply a set of words, giving you the possibility to craft multiple variations from the giv…☆115Updated 2 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆54Updated 2 years ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆76Updated last year
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆155Updated last year
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆172Updated 2 years ago
- Application with SQL Injection vulnerability and possible privilege escalation. Free vulnerable app for ethical hacking / penetration tes…☆83Updated 3 years ago
- Discovering Typo Squatting on your domains!☆81Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆137Updated last year