JoyGhoshs / NotesYouDontNeedLinks
Some Notes because i am too lazy to search
☆12Updated 4 years ago
Alternatives and similar repositories for NotesYouDontNeed
Users that are interested in NotesYouDontNeed are comparing it to the libraries listed below
Sorting:
- ☆10Updated last year
- Basically a regexp over a GitHub search.☆70Updated 2 years ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆90Updated 4 months ago
- This small repo contain OSCP public resources. You can download this on your Google Chrome with the following steps.☆18Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- ☆85Updated 7 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Updated 2 years ago
- Brute List is an updated word list for brute-forcing the assets. This is not like a normal outdated word list. I have collected several l…☆33Updated 3 years ago
- In this repo I collect all commands, links, techniques and tricks i found during my work as pentester, hacker, OSCP student and hack the …☆63Updated 4 years ago
- TCP port scanner, spews SYN packets asynchronously, scanning entire Internet in under 5 minutes.☆34Updated 6 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆76Updated 2 months ago
- Useful Github Dorks for BugBounty -☆65Updated 2 years ago
- Exotic and uncommon XSS Vectors to hit the target as quickly as possible.☆20Updated 5 years ago
- Script to utilize the v2 pwndb onion site to find leaked passwords.☆18Updated 2 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆15Updated 4 months ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- Host Header Injection Scanner☆47Updated 4 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆65Updated 5 months ago
- Searchsploit alternative. It differs in that it uses searchengines, can run unattended in the background, plays well with nmap and is abl…☆17Updated 5 years ago
- OSCP Preperation☆14Updated 3 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 3 years ago
- just a little treasure chest of stuff I need to watch / read later☆32Updated 4 years ago
- Mobile Pentesting Guide (WIP)☆24Updated 5 years ago
- List of sources for cybersecurity news☆36Updated 2 years ago
- Yet another web recon tool☆62Updated last year
- Wiki to collect Red Team infrastructure hardening resources☆30Updated 6 years ago
- Get URLs from the Wayback Machine. Able to handle large outputs.☆23Updated last year
- ☆44Updated last year
- Write-Ups for TryHackMe☆21Updated 4 years ago
- A simple reconnaissance framework for bug bounty hunting☆36Updated 4 years ago