☆13Oct 16, 2025Updated 4 months ago
Alternatives and similar repositories for Offensive-Pentesting-Resources
Users that are interested in Offensive-Pentesting-Resources are comparing it to the libraries listed below
Sorting:
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆101Feb 12, 2025Updated last year
- Complete Python Pandas Tutorial in Hindi (With Notes)☆11Sep 15, 2023Updated 2 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆98Sep 27, 2025Updated 5 months ago
- This program aims to check active targets by saving screenshots in a project.☆14Jan 9, 2026Updated last month
- This repo includes all my codings, analytics and documentation for my AWS DeepRacer Competition☆11Oct 4, 2023Updated 2 years ago
- Efficiently manage and track your job application history☆13May 1, 2025Updated 10 months ago
- Compiling a list of free learning resources in different areas of tech☆13Jul 19, 2023Updated 2 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆45Sep 28, 2020Updated 5 years ago
- Repository of wordlists and dictionaries for fuzzing and bruteforcing☆10Aug 17, 2020Updated 5 years ago
- Windows / Linux Local Privilege Escalation Workshop☆11Jan 15, 2019Updated 7 years ago
- ☆22Sep 4, 2025Updated 6 months ago
- This is a Burp Suite extension that automatically decodes unicode escape sequences. It supports Persian, Chinese, Russian and other langu…☆12Jan 23, 2024Updated 2 years ago
- A Sigma based detection pipeline☆13Dec 15, 2023Updated 2 years ago
- Burp suite extension which help you to find inconsistency between content-type header and body parsers☆11Sep 14, 2025Updated 5 months ago
- Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and n…☆12May 17, 2022Updated 3 years ago
- Blind XSS SVG☆10Mar 27, 2023Updated 2 years ago
- SPA Route Scanner is a Chrome extension that scans Single Page Applications (SPAs) to find and list all internal routes. Instantly discov…☆13Jul 31, 2025Updated 7 months ago
- Grepable cheat sheets for pentesting. Each sheet one tool.☆11Oct 15, 2020Updated 5 years ago
- A collection of tools for the Janus exploit [CVE-2017-13156].☆10Oct 22, 2019Updated 6 years ago
- uitvim :P (IDE)☆29Feb 24, 2026Updated last week
- This script was developped to assist in SpearPhishing campaign during Red Team operations. It can be used to generate random name based o…☆13Feb 6, 2023Updated 3 years ago
- https://github.com/tatsu-lab/stanford_alpaca☆14Mar 19, 2023Updated 2 years ago
- A Tool for Domain Flyovers - my version of michenriksen's aquatone☆10May 1, 2023Updated 2 years ago
- Private keys that have become public ...☆21Jun 8, 2022Updated 3 years ago
- A (remote) control center for pwnagotchi... (think: locally: Flashing a pwnagotchi zip or image to an sd or mmc and add custom config.tom…☆12Jun 17, 2023Updated 2 years ago
- Useful cyber security and digital forensics resources☆15Oct 20, 2020Updated 5 years ago
- CyberSecurity Resources (Threat Intelligence, Malware Analysis, Pentesting, DFIR, etc)☆11Nov 30, 2023Updated 2 years ago
- CompTIA a+_cyber Specialization☆12Nov 12, 2023Updated 2 years ago
- List of resources about CyberSecurity such as CTF, DFIR, Offsec, etc☆11Dec 29, 2025Updated 2 months ago
- Burp Suite Configuration Tweak☆13Mar 15, 2024Updated last year
- Kudzu is a Go C2 platform with an emphasis on extensibility.☆11Mar 30, 2021Updated 4 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- ☆11Dec 17, 2023Updated 2 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- We are a Swiss Capture The Flag team. We participate in CTFs and publish write-ups on CTF tasks.☆10Mar 25, 2019Updated 6 years ago
- ☆16Aug 20, 2017Updated 8 years ago
- API Penetration Testing Notes☆16Sep 25, 2025Updated 5 months ago
- A collection of awesome software, learning tutorials, theoretical resources, books and videos, best practices in applied cryptography.☆12Feb 4, 2022Updated 4 years ago