PanAdamski / AllPortSwiggerSolutionsLinks
Here you will find all solutions to all tasks from the https://portswigger.net/ platform written in python
☆25Updated 6 months ago
Alternatives and similar repositories for AllPortSwiggerSolutions
Users that are interested in AllPortSwiggerSolutions are comparing it to the libraries listed below
Sorting:
- Find CVEs associated to Linux and public exploits on github☆119Updated 4 months ago
- Knowledge Management for Offensive Security Professionals Official Repository☆147Updated 5 months ago
- This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used…☆225Updated 8 months ago
- ☆187Updated 3 months ago
- ZeroTrace is a powerful ethical hacking tool for anonymization, routing all your system network traffic through the Tor network, making i…☆123Updated 2 weeks ago
- 🥷 SecArchive - Cybersecurity Resource Collection A curated archive of high-quality resources for learning cybersecurity, bug bounty, et…☆205Updated 2 weeks ago
- Everything from my OSEP study.☆170Updated 7 months ago
- ☆119Updated 2 months ago
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆124Updated 6 months ago
- This script automates SQL injection testing using SQLMap with AI-powered decision making.☆203Updated 2 months ago
- ☆241Updated 6 months ago
- Quick scripts I developed to streamline OSCP tasks☆152Updated last month
- AI for Ethical Hacking - Workshop☆154Updated last month
- The repository contains useful GitHub dorks for finding open-source vulnerabilities.☆82Updated last year
- A visual methodology tracking platform tailored for offensive security assessments☆176Updated this week
- Scripts to download every Wordpress plugin (updated in the last 2 years) and run Semgrep over the lot of it while storing output in a dat…☆77Updated 6 months ago
- Damn Vulnerable API☆71Updated 5 months ago
- A collection of config files for linux focusing on hackthebox theme☆50Updated 7 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆118Updated this week
- A curated list of cloud pentesting resource, contains AWS, Azure, Google Cloud☆122Updated 3 years ago
- OWASP Foundation web repository☆38Updated 6 months ago
- A blind SQL injection brute forcer☆109Updated 3 months ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆63Updated 2 months ago
- ☆40Updated 7 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆90Updated last month
- 🔍 LFIer is a powerful and efficient tool for detecting Local File Inclusion (LFI) vulnerabilities in web applications.☆53Updated 7 months ago
- Dredging up secrets from the depths of the file system☆129Updated 9 months ago
- BaldHead is a modular and interactive Active Directory (AD) attack framework built for red teamers and security testers. It automates enu…☆102Updated last month
- List of tools and resources for pentesting Microsoft Active Directory☆84Updated last month
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆242Updated last month