A curated list of different pentesting resources
☆30Feb 26, 2022Updated 4 years ago
Alternatives and similar repositories for resources
Users that are interested in resources are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Repository contains various payloads, tools, tips and tricks from various hackers around the world. Please take a quick look down her…☆15May 15, 2025Updated 11 months ago
- ☆18Aug 1, 2022Updated 3 years ago
- Android Penetration Testing setup tool. Garuda automates the installation of the required tools to perform Android Security Analysis.☆73Sep 10, 2023Updated 2 years ago
- ☆13Jan 4, 2022Updated 4 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Jan 21, 2023Updated 3 years ago
- Deploy open-source AI quickly and easily - Special Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Noobish Recon Automation☆20Feb 15, 2024Updated 2 years ago
- ☆20Apr 5, 2023Updated 3 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Active DIrectory Lab for Pentesting Practice☆25Aug 9, 2022Updated 3 years ago
- Everything about xss protection technology☆14Oct 22, 2019Updated 6 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Discovery Header Bug Bounty to DoD☆49Aug 20, 2021Updated 4 years ago
- Check List☆80Jul 16, 2022Updated 3 years ago
- AWS Security Tool☆29Jan 1, 2024Updated 2 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- ☆28Apr 3, 2021Updated 5 years ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆21Feb 19, 2021Updated 5 years ago
- This tool is a simple LFI, RFI, RCE, and Joomla Components vulnerability scanner, created by JayCyberSecurity☆22Apr 26, 2022Updated 4 years ago
- A repository hosting some of my own vulnerability reports and proof-of-concepts.☆15Aug 8, 2019Updated 6 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- All in one subdomain Enumeration tool☆21Jan 1, 2023Updated 3 years ago
- ☆27May 14, 2022Updated 3 years ago
- Getting started in bug bounty!☆33Jul 16, 2021Updated 4 years ago
- BeEF Remote Control Metasploit Plugin - see README.beef☆13May 11, 2018Updated 7 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- This repository include Docker Machines for practicing on some of the Web Attacks.☆14Nov 20, 2023Updated 2 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- Autonomous Agent for Kubernetes☆15Feb 14, 2025Updated last year
- ☆12Jun 20, 2020Updated 5 years ago
- ☆13Apr 25, 2026Updated 2 weeks ago
- CVE's we discovered along the way☆17Oct 18, 2021Updated 4 years ago
- pfSense Configuration Auditing Script☆13Dec 14, 2020Updated 5 years ago
- ☆18Jun 24, 2021Updated 4 years ago
- An Automation Tool Written in Python which uses Twitter and GitHub API☆15Jan 25, 2022Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Just some public notes that can be useful and i want let the world knows.☆90Oct 18, 2020Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆11Apr 16, 2022Updated 4 years ago
- ☆11Feb 11, 2023Updated 3 years ago
- Google Hack Database dork automatic tool.☆27Dec 11, 2017Updated 8 years ago
- Comprehensive MCP server for bug bounty hunting and web application penetration testing☆29Sep 13, 2025Updated 7 months ago
- A curated list of awesome AWS IAM tools, libraries guides, blogs, and other resources☆17Jan 5, 2020Updated 6 years ago
- Mirror for exploit-exercises.com☆13Jan 3, 2019Updated 7 years ago