A curated list of different pentesting resources
☆30Feb 26, 2022Updated 4 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below
Sorting:
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 9 months ago
- Cyber Security Foundations☆35May 30, 2021Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆20Apr 5, 2023Updated 2 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 3 years ago
- Check List☆81Jul 16, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Detects attempts and successful exploitation of CVE-2022-26809☆33Sep 16, 2024Updated last year
- A forensic analysis framework for enumerating slack artifacts residing in the Operating system.☆18Sep 23, 2025Updated 5 months ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆19Jun 16, 2021Updated 4 years ago
- My notes of Day1 Day2 will be posted here as journey☆17Jan 6, 2021Updated 5 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Red Team Stuffs☆19Jul 7, 2022Updated 3 years ago
- My configs, tools and what not. For everytime that I blow up my vm....☆18Jan 21, 2020Updated 6 years ago
- ☆19Jun 24, 2021Updated 4 years ago
- Discovery Header Bug Bounty to DoD☆49Aug 20, 2021Updated 4 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- Burp Extension for BFAC (Advanced Backup-File Artifacts Testing for Web-Applications)☆20Aug 9, 2021Updated 4 years ago
- 该项目为个人渗透测试学习笔记,请勿用作其他用途!☆25Jul 28, 2022Updated 3 years ago
- Just some public notes that can be useful and i want let the world knows.☆88Oct 18, 2020Updated 5 years ago
- Speed-up your hunting with google dorks🚀🚀☆21Sep 8, 2022Updated 3 years ago
- Burp Extension to identify PII data☆21Jan 29, 2021Updated 5 years ago
- Reference architecture and proof of concept implementation for supply chain security gateway☆23Apr 1, 2023Updated 2 years ago
- Enhanced 403 bypass header☆21Sep 12, 2022Updated 3 years ago
- Magic tricks using grep, sed and awk☆26Jul 28, 2022Updated 3 years ago
- ☆27May 14, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago