https://pinkdraconian.gitbook.io/methodology/
☆13Aug 24, 2021Updated 4 years ago
Alternatives and similar repositories for Pentest-Methodologies
Users that are interested in Pentest-Methodologies are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- All the cheatsheets a man could ever need☆32Mar 7, 2021Updated 5 years ago
- ☆10Aug 17, 2021Updated 4 years ago
- A web security research tool for DOM testing☆24Feb 7, 2026Updated last month
- Repository for the SecurityTube Linux Assembly Expert Certification☆10Oct 11, 2017Updated 8 years ago
- PredictionIO Recommendation Engine Template (Scala-based parallelized engine)☆14Jul 18, 2019Updated 6 years ago
- ☆10Dec 3, 2021Updated 4 years ago
- Spring-Boot app for demonstrating security vulnaribilities☆13Aug 21, 2019Updated 6 years ago
- ☆35Jan 22, 2026Updated 2 months ago
- ☆11Jun 17, 2015Updated 10 years ago
- scoreserver web application for CTF(Capture The Flag)☆24Aug 3, 2022Updated 3 years ago
- Send an issue to propose a talk☆17Jul 12, 2019Updated 6 years ago
- ☆10Sep 11, 2020Updated 5 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Jan 6, 2021Updated 5 years ago
- A tool to generate OpenXML XXE Payloads written in Python3.☆16Aug 21, 2019Updated 6 years ago
- Reactor hands on generative AI workshop with Azure OpenAI☆11Jan 30, 2024Updated 2 years ago
- ☆16Oct 8, 2025Updated 5 months ago
- Rapid Assessment of Web Resources☆19Nov 11, 2016Updated 9 years ago
- A demo application using the Android AlarmManager☆18Apr 18, 2013Updated 12 years ago
- Source files and writeups for UTCTF 2019☆14Oct 21, 2020Updated 5 years ago
- Different writeups and solutions of all CTF Contests that we've played!☆14Mar 7, 2019Updated 7 years ago
- Python code for communicating with Xiaomi M365 Scooter over GATT using bluepy☆13Jul 8, 2018Updated 7 years ago
- I use all of scripts in this repository daily and schedule them to control my systems. Also, it includes all of my penetration tests scri…☆30Jun 26, 2022Updated 3 years ago
- A tool for fuzzing for ports that allow outgoing connections☆17Oct 15, 2018Updated 7 years ago
- Our CTF to celebrate our hackers approaching $50M in bounty earnings!☆15Mar 25, 2023Updated 3 years ago
- Manage a uniform team of security managers for every organization in your enterprise☆24Feb 9, 2026Updated last month
- Ejemplos de programación concurrente con Java☆12Oct 30, 2022Updated 3 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆34Mar 9, 2023Updated 3 years ago
- Open Security Summit 2018☆29Nov 16, 2020Updated 5 years ago
- Practical Web Penetration Testing, published by Packt☆25Jan 30, 2023Updated 3 years ago
- A phishing tool to set a soft-AP on raspberryPi, filter the Http request and DNS query from the client and redirect the connection to a f…☆17Mar 4, 2018Updated 8 years ago
- The teaching vessel and "interactive textbook" that I am building for the Intro to Linux class at the USCGA.☆26Apr 26, 2024Updated last year
- Examples of Ruby code in Crystal and benchmarks to compare☆10Apr 16, 2022Updated 3 years ago
- The Computer Language Benchmarks Game in Zig☆12Nov 24, 2021Updated 4 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- CTF Write-ups☆27Apr 7, 2019Updated 6 years ago
- Bypass the Linux Netfilter using conntrack helpers☆24May 30, 2015Updated 10 years ago
- TokenGet is a tool to intercept Samsung Pay tokens using a credit card reader and a raspberry zero.☆25Aug 15, 2016Updated 9 years ago
- The easiest way to check Gmail from browser toolbar on Firefox and Opera☆21Jul 20, 2017Updated 8 years ago
- The dev version of jaffle shop☆12Oct 28, 2024Updated last year