This repository is in progress, it will keep updating as I come across to new learning materials. Feel free to contribute.
☆221Sep 3, 2022Updated 3 years ago
Alternatives and similar repositories for Cloud-Pentesting
Users that are interested in Cloud-Pentesting are comparing it to the libraries listed below
Sorting:
- ☆23Jun 30, 2021Updated 4 years ago
- ☆755Aug 26, 2022Updated 3 years ago
- PDF slides☆246Aug 19, 2021Updated 4 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- Azure Security Resources and Notes☆1,713Feb 17, 2026Updated 2 weeks ago
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- Template used for my OSCP exam.☆29Aug 9, 2022Updated 3 years ago
- Given a list of domains, you resolve them and get the IP addresses.☆47Mar 2, 2022Updated 4 years ago
- ☆138Jul 9, 2021Updated 4 years ago
- ☆34Jun 23, 2021Updated 4 years ago
- A Burp Suite extension made to automate the process of finding reverse proxy path based SSRF.☆184Nov 22, 2021Updated 4 years ago
- vulnerable OAuth 2.0 applications: understand the security implications of your OAuth 2.0 decisions.☆328Mar 27, 2024Updated last year
- This repository contains a collection of cheatsheets I have put together for tools related to pentesting organizations that leverage clou…☆2,803Sep 17, 2024Updated last year
- A tool to parse, deduplicate, and query multiple port scans.☆57Aug 11, 2023Updated 2 years ago
- Cobalt Strike BOF to list Windows Pipes & return their Owners & DACL Permissions☆53Dec 21, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆953Dec 31, 2021Updated 4 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Feb 6, 2022Updated 4 years ago
- Mind-Maps of Several Things☆2,625Jun 29, 2023Updated 2 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆269Jun 27, 2025Updated 8 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Jan 22, 2025Updated last year
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Sep 6, 2021Updated 4 years ago
- ☆88May 27, 2021Updated 4 years ago
- Awesome list of step by step techniques to achieve Remote Code Execution on various apps!☆1,940Oct 7, 2023Updated 2 years ago
- This repository contains wordlists for each versions of common web applications and content management systems (CMS). Each version contai…☆534Dec 4, 2024Updated last year
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- ☆240Jun 10, 2021Updated 4 years ago
- Any presentation we've given at FortyNorth Security☆33Sep 27, 2021Updated 4 years ago
- Nuclei templates for K8S security scanning☆101Dec 2, 2021Updated 4 years ago
- Checks for signature requirements over LDAP☆98Oct 11, 2022Updated 3 years ago
- Slides and other material from various conference presentations.☆46Sep 10, 2025Updated 5 months ago
- A Collection of Notes, Checklists, Writeups on Bug Bounty Hunting and Web Application Security.☆1,977Sep 5, 2021Updated 4 years ago
- SSRF (Server Side Request Forgery) testing resources☆2,482Oct 12, 2024Updated last year
- SecurityExplained is a new series after the previous learning challenge series #Learn365. The aim of #SecurityExplained series is to crea…☆542Aug 4, 2022Updated 3 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- Awesome Bug bounty builder Project☆675Feb 15, 2023Updated 3 years ago
- This aggressor script uses a beacon's note field to indicate the health status of a beacon.☆141Sep 29, 2021Updated 4 years ago
- ☆436Jun 1, 2021Updated 4 years ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,900Oct 29, 2025Updated 4 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Oct 25, 2024Updated last year