InfoSecWarrior / Offensive-Pentesting-ResourcesLinks
☆9Updated last year
Alternatives and similar repositories for Offensive-Pentesting-Resources
Users that are interested in Offensive-Pentesting-Resources are comparing it to the libraries listed below
Sorting:
- Filter URLs to save your time.☆60Updated 2 years ago
- bash script for automating subdomain enumeration process either passive or active☆27Updated 6 months ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- ☆34Updated 2 years ago
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- JaelesFuzzer is a Powerful Automation tool for detecting XSS, SQLi, SSRF, Open-Redirect, etc.. Vulnerabilities in Web Applications☆20Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Template used for my OSCP exam.☆29Updated 2 years ago
- ☆25Updated last year
- Speed-up your hunting with google dorks🚀🚀☆22Updated 2 years ago
- Enumerate old versions of robots.txt paths using Wayback Machine for content discovery☆50Updated last year
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆23Updated last year
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆54Updated 2 months ago
- ☆55Updated 2 years ago
- Find related domains of a given domain.☆100Updated last year
- ☆18Updated last year
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Simple bash Oneliners to make life easier☆62Updated 4 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated 2 years ago
- Passive Web Vulnerability Detection Tool☆34Updated last month
- Burp suite extension to find sensitive information by checking incoming text OR binary websocket messages☆48Updated 5 months ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated last month
- Xss payload for bypassing waf☆16Updated 5 years ago
- Fast Bug Bounty Script☆37Updated 5 months ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- Your subdomains are free for the taking - no API key, no mistaking! 🕺☆35Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- DNS resolution tracing tool☆34Updated 3 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 10 months ago
- Vulnerable Code Snippets☆45Updated 2 years ago