PacktPublishing / Pentesting-APIsLinks
Pentesting APIs, Published by Packt
☆14Updated last year
Alternatives and similar repositories for Pentesting-APIs
Users that are interested in Pentesting-APIs are comparing it to the libraries listed below
Sorting:
- API fuzzer that exposes security flaws by sending malformed inputs☆16Updated last year
- Bash Shell Scripting for Pentesters, published by Packt☆39Updated 3 months ago
- ☆24Updated 8 months ago
- Automated tool for domains & Subdomains Gathering☆14Updated last year
- ☆22Updated last year
- Basic guide for performing a Physical PenTest - Nist 800-12, 800-53, 800-115, 800-152☆21Updated 2 years ago
- Internal Network Penetration Test Playbook☆20Updated 4 years ago
- Handy scripts and one-liners to make life easier☆37Updated 2 years ago
- External Playbooks for Public Access☆40Updated 8 months ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆46Updated last year
- Security Orchestration, Automation and Response for Security Analysts, published by Packt☆21Updated 9 months ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- Challenge Python☆19Updated 2 years ago
- 📙 User documentation for Caido☆32Updated this week
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆13Updated 8 months ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- Comprehensive AWS cloud reconnaissance and privilege escalation toolkit written in Python. Features IAM, EC2, S3, Lambda, ECS, Secrets Ma…☆44Updated 3 months ago
- ☆24Updated 4 months ago
- New Framework Red Team Operations☆19Updated 4 years ago
- OSCP Study Guide☆40Updated 3 years ago
- All the code snippets from my Secure Code Review series on youtube (youtube.com/@muqsitbaig)!☆23Updated last year
- Script to manage and create local pentesting training virtual lab☆49Updated 5 years ago
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆22Updated last year
- ☆28Updated last year
- A Red Teaming tool focused on profiling the target.☆28Updated 4 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- MayorSec DNS Enumeration Tool☆89Updated 11 months ago
- Windows Stack Based Auto Buffer Overflow Exploiter☆20Updated 4 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated 2 years ago