NeuronAddict / pentesting-notes
Notes from OSCP, CTF, security adventures, etc...
☆58Updated last year
Alternatives and similar repositories for pentesting-notes:
Users that are interested in pentesting-notes are comparing it to the libraries listed below
- Simple fork from degoogle original project with bug hunting purposes☆88Updated 2 years ago
- ☆47Updated 7 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- Advanced Reconnaissance and Web Application Discovery☆79Updated 3 years ago
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- AWS S3 open bucket poc automated script.☆56Updated 3 years ago
- ☆27Updated 5 years ago
- Noobish Recon Automation☆21Updated last year
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago
- ☆22Updated 3 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆89Updated last year
- A Simple Tool to Pull Paid Bounty Scopes for Wide Recon Actvities☆103Updated 3 years ago
- ☆21Updated 2 years ago
- PenTest Methodology☆15Updated 3 months ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆78Updated 4 years ago
- ☆74Updated 9 months ago
- 3klector is an automation Recon tool which collecting information about Acquisitions and ASN which related to Big Scope company☆49Updated 2 years ago
- Template used for my OSCP exam.☆27Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- I collected it to help the bug hunter get a reward☆57Updated 2 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 4 years ago
- Summary of almost all paid bounty reports on H1☆40Updated 4 years ago
- Penetration Testing Checklist☆35Updated 4 years ago
- Find subdomains and takeovers.☆84Updated 2 years ago
- List of Google Dorks for sites that have responsible disclosure program / bug bounty program☆20Updated 5 years ago
- Guide to SSRF☆66Updated last year
- Sometimes we want to fuzz a set of sub-domain URLs with a common wordlist. Fuzzing them one by one is a tedious task, not to mention the …☆51Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 3 weeks ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago