HaxonicOfficial / CyberSec_ResourcesLinks
Get top quality resources from this repo. (Beginner Specific)
☆13Updated last year
Alternatives and similar repositories for CyberSec_Resources
Users that are interested in CyberSec_Resources are comparing it to the libraries listed below
Sorting:
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 3 years ago
- It contain google dork to find the wsdl file.☆13Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆15Updated 4 years ago
- A tools for JavaScript Recon☆21Updated 4 years ago
- Automated Recon Framework☆24Updated 4 years ago
- Creating a Database for Mass Recon☆12Updated 4 years ago
- Script Recon Bug Bounty☆10Updated 4 years ago
- Python script that automate the process of generating various reverse shells.☆15Updated 4 years ago
- Credax - Fuzzing Tool with Slack Notifications. Also removes false positive responses.☆10Updated 3 years ago
- Concept:☆11Updated 3 years ago
- A tool to check for response status codes with ease☆14Updated 2 years ago
- Web application pentesting recon☆23Updated 4 years ago
- Tool for checking reflecting Parameters in a URL.☆10Updated 4 years ago
- Tool to automatically email results from your Python scripts to your inbox as text or as a file attachment, storing the sender email acco…☆7Updated 5 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- Automate your subdomain enumeration, subdomain takeover, management, nuclei, etc. in one go.☆10Updated 2 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- ☆12Updated 4 years ago
- ☆10Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- ☆10Updated 3 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- Open Redirect Vulnerability Payload List☆12Updated 4 years ago
- ☆21Updated 4 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Updated 4 years ago
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Extract endpoints from specific Git repository for fuzzing☆23Updated 4 years ago