Notes from OSCP, CTF, security adventures, etc...
☆65Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for pentesting-notes
Users that are interested in pentesting-notes are comparing it to the libraries listed below
Sorting:
- ☆27Dec 5, 2019Updated 6 years ago
- Scripts, tools and drivers for wardriving under Mac OSX☆14Dec 7, 2016Updated 9 years ago
- Beacon Object Files used for Cobalt Strike☆19Jul 18, 2023Updated 2 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆19Feb 29, 2020Updated 6 years ago
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Awesome Mobile Application Penetration Testing Cheat Sheet☆14May 29, 2021Updated 4 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Aug 9, 2023Updated 2 years ago
- Offsec Pentest and Bug Bounty Notes☆24May 28, 2020Updated 5 years ago
- Kali Linux Cheat Sheet for Penetration Testers☆14Jun 19, 2017Updated 8 years ago
- OSCP cheatsheet☆107Jan 11, 2024Updated 2 years ago
- My personal bug bounty toolkit.☆164Jun 18, 2024Updated last year
- Pentesting Pratic Notes☆15Oct 30, 2021Updated 4 years ago
- ☆33Sep 7, 2020Updated 5 years ago
- Strafer: A tool to detect potential infections in Elasticsearch instances☆27Mar 14, 2021Updated 5 years ago
- Pentesting notes☆19Jan 31, 2026Updated last month
- A tool to sync mythic events with ghostwriter oplog.☆14Nov 21, 2024Updated last year
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Python3 script that can download samples directly from Abuse.CH or via submitted URLs☆15Apr 15, 2020Updated 5 years ago
- A Python script to parse net blocks & domain names from SPF record☆85Jun 2, 2020Updated 5 years ago
- API research and learning☆12May 22, 2019Updated 6 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆36Mar 1, 2020Updated 6 years ago
- A command line Curses based json viewer and tabulator☆30Aug 3, 2025Updated 7 months ago
- New Framework Red Team Operations☆20Jun 7, 2021Updated 4 years ago
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Transform your pwnagotchi sidekick into a cyber deck rover!☆12Sep 26, 2025Updated 5 months ago
- Resources, Tips, Tricks , Resources, Notes and much more☆21Jan 12, 2023Updated 3 years ago
- ☆12Feb 18, 2022Updated 4 years ago
- ☆162Dec 7, 2017Updated 8 years ago
- ☆129Jun 15, 2020Updated 5 years ago
- Simple Recon is just a simple bash script to automate my recon process.☆27May 12, 2021Updated 4 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Dec 13, 2022Updated 3 years ago
- Notes Taken for HTB Machines & InfoSec Community.☆377Aug 8, 2022Updated 3 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- This is where I share code/material shown in my videos☆76Jun 17, 2023Updated 2 years ago
- Testing POC for use cases☆25Nov 24, 2024Updated last year
- Vagrant Files to create a Virtualbox VM for Malware Analysis☆13Jun 1, 2021Updated 4 years ago
- A tool to bruteforce nameservers when working with subdomain delegations to AWS.☆58Aug 22, 2019Updated 6 years ago
- Defensive-oriented Active Directory enumeration☆23Jan 22, 2016Updated 10 years ago