Stuub / Offensive-Security-Checklist
☆11Updated last year
Alternatives and similar repositories for Offensive-Security-Checklist:
Users that are interested in Offensive-Security-Checklist are comparing it to the libraries listed below
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆57Updated 2 months ago
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆32Updated this week
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆31Updated 4 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated 5 months ago
- A Personal Collection of Infosec Dorks☆195Updated last year
- ☆77Updated last year
- Play Hack The Box directly on your system.☆42Updated 5 months ago
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆121Updated 2 months ago
- PoC analyzer of your email address exposure on various services☆55Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆57Updated last week
- Search this list of OSINT Practitioners and learn about OSINT, it includes numerous, blogs and tutorials.☆92Updated 4 months ago
- A vast collection of security tools and resources curated by the community.☆192Updated 2 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆185Updated 2 months ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆29Updated 8 months ago
- Here are some cool and some unpublished Dorks☆69Updated last month
- ☆45Updated last month
- Source of swisskyrepo.github.io - Public☆21Updated 4 months ago
- Legion is an open source, easy-to-use, super-extensible and semi-automated network penetration testing tool that aids in discovery, recon…☆24Updated 3 months ago
- All About Web Recon & OSINT☆113Updated last year
- GoogleDorker - Unleash the power of Google dorking for ethical hackers with custom search precision.☆164Updated last month
- this is a small script for extracting questions from try hack me room ,and creating a MD file☆12Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆41Updated 4 months ago
- ⚔️ A compiled list of companies who have active programs for responsible disclosure☆108Updated last week
- A curated checklist of tasks to be done during engagements☆32Updated 5 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆149Updated last year
- List of some cybersecurity conferences☆57Updated 2 weeks ago
- This is a repository for network security tools and technologies.☆94Updated 2 years ago
- Robofinder retrieves historical #robots.txt files from #Archive.org, allowing you to uncover previously disallowed directories and paths …☆164Updated 3 weeks ago
- ☆27Updated 7 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year