PinkDraconian / InfoSecCheatSheetsLinks
All the cheatsheets a man could ever need
☆30Updated 4 years ago
Alternatives and similar repositories for InfoSecCheatSheets
Users that are interested in InfoSecCheatSheets are comparing it to the libraries listed below
Sorting:
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆39Updated 6 years ago
- Journey to Try Harder !!!☆33Updated 6 years ago
- YesWeHack Api Extension for Burp☆90Updated last year
- Obsidian Vault for bug bounty hunters☆94Updated 4 years ago
- A list of web application security☆80Updated 7 years ago
- Penetration Testing Checklist☆36Updated 5 years ago
- List of Awesome Red Teaming Resources☆114Updated 6 years ago
- 🐑 Websheep is an app based on a willingly vulnerable ReSTful APIs.☆58Updated last year
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- Notes from OSCP, CTF, security adventures, etc...☆62Updated last year
- ☆32Updated 4 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆99Updated 3 years ago
- Simultaneously execute various subdomain enumeration tools and aggregate results.☆43Updated last year
- ☆21Updated 3 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 2 years ago
- The OWASP Testing Guide includes a "best practice" penetration testing framework which users can implement in their own organizations and…☆77Updated 6 years ago
- A tool for searching a Git repository for interesting content☆107Updated last year
- ☆78Updated 6 years ago
- BurpSuite using the document and some extensions☆70Updated 5 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- Parse source code directories and output list of URLs that are then sent through a proxy.☆153Updated 3 years ago
- The Mobile Security Testing Guide (MSTG) is a manual for testing the security of mobile apps. It describes technical processes for verif…☆34Updated 8 years ago
- A curated list of different pentesting resources☆29Updated 3 years ago
- Damn Vulnerable WordPress☆190Updated last year
- OWASP Juice Shop: Probably the most modern and sophisticated insecure web application☆22Updated 5 years ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆64Updated 5 years ago
- A collection of personal scripts used in hacking excercises.☆153Updated 5 years ago
- https://pinkdraconian.gitbook.io/methodology/☆13Updated 4 years ago
- A LateX template for penetration testing reports☆106Updated 6 years ago
- A collection of various capture the flag event write-ups and anomalies☆42Updated 6 years ago