PR-Peri / Hacking-Toolkits
Hack Tricks and survival kit (For Bug Bounty Program Use)
☆11Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Hacking-Toolkits
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- Subdomain Enumeration and Scanner☆32Updated 4 years ago
- Google Chrome Extension automates testing fundamental Web Problems via Chrome☆21Updated 3 years ago
- Burp suite Certificate modification tool☆17Updated last year
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- pentest toolbox☆28Updated 2 years ago
- Open Redirect Vulnerability Payload List☆12Updated 3 years ago
- Uses Shodan API to pull down C2 servers to run known exploits on them.☆18Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- Quickly add http and https domains to BurpSuite's scope with all paths.☆16Updated 8 years ago
- Simple tools to handle string and generate subdomain permutations☆14Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 5 months ago
- A tool that scans a list of given domains, and returns the status codes for each domain on both port 80 & 443☆18Updated 3 years ago
- ☆20Updated 5 years ago
- Burp Suite extension for extracting metadata from files☆19Updated 3 years ago
- Static analysis of APKs with regular expressions☆10Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 4 years ago
- Ctf Writeups☆10Updated 4 years ago
- A Simple Web Shell used for Remote Code Execution.☆11Updated 5 years ago
- Security test tool for Blind XSS☆27Updated 4 years ago
- Repo for all the Recon and enum techniques, Exploitation, Priv-escalation (Linux and Windows), post exploitation☆16Updated 4 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 7 years ago
- So many shells in so little time☆10Updated 5 years ago