NeuronAddict / pentesting-notesLinks
Notes from OSCP, CTF, security adventures, etc...
☆62Updated last year
Alternatives and similar repositories for pentesting-notes
Users that are interested in pentesting-notes are comparing it to the libraries listed below
Sorting:
- ☆51Updated 8 years ago
- AWS S3 open bucket poc automated script.☆57Updated 4 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- ☆32Updated 4 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 3 years ago
- ☆49Updated 5 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 5 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- ☆55Updated 4 years ago
- ☆28Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆105Updated 4 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- ☆22Updated 4 years ago
- Ultimate Package Of 50 Bug Bounty Hunting Tools☆46Updated 3 weeks ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 5 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆71Updated last year
- The scripts I write to help me on my bug bounty hunting☆124Updated 3 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Penetration Testing Checklist☆36Updated 5 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆61Updated last year
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆90Updated 2 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆44Updated 9 months ago
- ☆77Updated last year
- Advanced Reconnaissance and Web Application Discovery☆88Updated 3 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆55Updated 3 years ago
- ☆38Updated 4 years ago
- Noobish Recon Automation☆21Updated last year