Professionally Evil Web Application Penetration Testing 101
☆148Jun 16, 2020Updated 5 years ago
Alternatives and similar repositories for pewapt101
Users that are interested in pewapt101 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.☆20Dec 10, 2022Updated 3 years ago
- Security Related Tools and Resources☆16Aug 10, 2017Updated 8 years ago
- Bash Enumeration Script☆18Oct 18, 2019Updated 6 years ago
- Exfiltrate files via DNS☆95Aug 29, 2013Updated 12 years ago
- Calculate the domain age with python script☆11Mar 27, 2018Updated 8 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A collection of files for adding and leveraging custom properties in BloodHound.☆186Nov 28, 2019Updated 6 years ago
- ☆50Aug 30, 2020Updated 5 years ago
- ☆14Aug 13, 2019Updated 6 years ago
- A Simple CLI App to mark all EXCEL sheets visible (i.e. sets "Very Hidden" and "Hidden" to "Visible")☆11Apr 16, 2020Updated 5 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- ☆24Nov 11, 2025Updated 4 months ago
- various slides and presentations I've worked on☆19Mar 21, 2025Updated last year
- Slides and reference material from Evading Autoruns presentation at DerbyCon 7 (September 2017)☆106Feb 10, 2021Updated 5 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- ☆14Jul 13, 2020Updated 5 years ago
- Mobile Application Vulnerability Detection☆12May 19, 2017Updated 8 years ago
- ☆30Nov 15, 2018Updated 7 years ago
- Simple Random Password Generator [BASH]☆10Sep 24, 2018Updated 7 years ago
- Data from analysis of the custom sample from the chapter "Practical Analysis and Test"☆12Aug 1, 2020Updated 5 years ago
- Virtual Machine for Adversary Emulation and Threat Hunting☆1,315Jan 22, 2025Updated last year
- Methodology for high-quality web application security testing - https://github.com/tprynn/web-methodology/wiki☆212Oct 31, 2024Updated last year
- ☆134Feb 5, 2021Updated 5 years ago
- Understanding and analyzing carrier files workshop repo☆51Dec 4, 2019Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Pentesting notes☆19Jan 31, 2026Updated 2 months ago
- Dashboarding and Tooling front-end for PowerShell Empire using PowerShell Universal Dashboard☆104Apr 19, 2019Updated 6 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- A PowerShell based utility for the creation of malicious Office macro documents.☆1,110Nov 3, 2017Updated 8 years ago
- Presentation Slides☆26Jun 7, 2019Updated 6 years ago
- Phactive - Monitoring an Environment with Nmap red teaming☆12May 11, 2019Updated 6 years ago
- Domain Password Audit Tool for Pentesters☆1,028Dec 24, 2025Updated 3 months ago
- Open Penetration Testing Bookmarks Collection☆20Jun 9, 2015Updated 10 years ago
- Finding Valuable Needles in Global Source Code Haystacks with Automation☆17Feb 11, 2021Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- put this here because archival reasons.☆28Feb 18, 2018Updated 8 years ago
- Automate the creation of a lab environment complete with security tooling and logging best practices☆4,932Jul 6, 2024Updated last year
- Collection of dockerfiles to build containers☆13Mar 19, 2018Updated 8 years ago
- Smart Install Exploitation Tool☆594Dec 21, 2021Updated 4 years ago
- Python3 script to parse txt files containing Mimikatz output☆99Jun 19, 2020Updated 5 years ago
- Password spraying using AWS Lambda for IP rotation☆656Feb 14, 2023Updated 3 years ago
- Extracting URLs of a specific target based on the results of "commoncrawl.org"☆275Dec 4, 2025Updated 4 months ago