Muhammd / Awesome-Payloads
☆30Updated 5 years ago
Related projects: ⓘ
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆46Updated 2 years ago
- Enumerate AWS permissions and resources.☆62Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago
- ☆37Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆27Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆55Updated last year
- OSCP Preperation☆12Updated 3 years ago
- ☆41Updated last year
- Reconnaissance and Enumeration automation script☆51Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated 11 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆112Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆41Updated last year
- ☆13Updated 11 months ago
- Find the remote website version based on a git repository☆122Updated 3 years ago
- ☆18Updated last year
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Execute Trickest workflows right from your terminal☆76Updated last month
- ☆61Updated last year
- Checks if files is accessible based on the source code.☆16Updated 6 months ago
- security.txt collection of most popular world-wide domains☆50Updated 11 months ago
- ☆62Updated 4 months ago
- Script for Bug Bounty☆28Updated 3 years ago
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- Performing automated scan using Burp Suite Pro & Vmware Burp Rest API☆47Updated last year
- Analysis and management tools for an Open Asset Model database☆38Updated this week
- ☆21Updated 4 years ago
- Handy scripts and one-liners to make life easier☆34Updated last year
- A list of threat sinks used in the manual security source code review for application security☆69Updated last year