NetW0rK1le3r / PENTESTING-BIBLELinks
☆18Updated 2 years ago
Alternatives and similar repositories for PENTESTING-BIBLE
Users that are interested in PENTESTING-BIBLE are comparing it to the libraries listed below
Sorting:
- ☆139Updated 3 years ago
- Web application with vulnerabilities found in real cases, both in pentests and in Bug Bounty programs.☆167Updated last year
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆155Updated this week
- ☆133Updated 2 years ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated 10 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆108Updated 5 months ago
- OWASP based Web Application Security Testing Checklist☆73Updated 10 months ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆65Updated 3 months ago
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆74Updated 2 years ago
- Red Team Guides☆138Updated last year
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆91Updated 2 months ago
- Checks for SSRF using built-in custom Payloads after fetching URLs from Multiple Passive Sources & applying complex patterns aimed at SSR…☆122Updated 9 months ago
- ☆74Updated 3 years ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- List of red team resources☆95Updated 7 years ago
- ☆100Updated 4 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆47Updated 6 years ago
- This is a collection of Bug Bounty Tips collected from security researchers / bug hunters on Twitter.☆14Updated 4 years ago
- ☆202Updated 2 years ago
- ☆66Updated 3 years ago
- ☆47Updated 7 years ago
- This repository contains the files that provide the upload functionality in the IIS Server☆31Updated 3 years ago
- Shodan Dorks 2023☆236Updated 4 months ago
- Web Application Penetration Testing☆113Updated last month
- ☆64Updated 2 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- Automatic & lightning fast wordpress vulnerability scanner☆45Updated 3 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆45Updated 4 years ago
- list of useful commands, shells and notes related to OSCP☆80Updated 7 years ago