A curated list of different pentesting resources
☆30Feb 26, 2022Updated 4 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 11 months ago
- ☆18Aug 1, 2022Updated 3 years ago
- Cyber Security Foundations☆35May 30, 2021Updated 4 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- ☆20Apr 5, 2023Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- CVE-2022-32119 - Arox-Unrestricted-File-Upload☆17Dec 20, 2023Updated 2 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Subdomain Takeover lab is FREE for everyone. This means here is a legal to takeover Subdomain of this website. Here you'll find more tha…☆24Jan 1, 2025Updated last year
- Discovery Header Bug Bounty to DoD☆49Aug 20, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Check List☆80Jul 16, 2022Updated 3 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- ☆28Apr 3, 2021Updated 5 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- Getting started in bug bounty!☆33Jul 16, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- This contract allows for players to stake ETH and the pool is randomly shuffled and a winner is picked and immediately a new pool begins☆11Jan 2, 2022Updated 4 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Autonomous Agent for Kubernetes☆14Feb 14, 2025Updated last year
- ☆13Feb 18, 2024Updated 2 years ago
- ☆12Jun 20, 2020Updated 5 years ago
- pwnKit: Privilege Escalation USB-Rubber-Ducky payload, which exploits CVE-2021-4034 in less than 10sec's and spawns root shell for you.☆11Feb 8, 2022Updated 4 years ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- Serverless GPU API endpoints on Runpod - Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆19Jun 24, 2021Updated 4 years ago
- Raspberry Pi Media Server setup with hardware live metrics, file sharing and remote access. Clone the repo into your Pi and start deployi…☆16Jul 29, 2021Updated 4 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- Just some public notes that can be useful and i want let the world knows.☆90Oct 18, 2020Updated 5 years ago
- Gmail shell, for hackers execute commands via gmail☆19Feb 3, 2021Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago