TheGetch / Penetration-Testing-MethodologyLinks
This repo contains my pentesting template that I have used in PWK and for current assessments. The template has been formatted to be used in Joplin
☆25Updated 3 years ago
Alternatives and similar repositories for Penetration-Testing-Methodology
Users that are interested in Penetration-Testing-Methodology are comparing it to the libraries listed below
Sorting:
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- ☆20Updated 4 years ago
- ☆59Updated 3 years ago
- ☆67Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- Script for Bug Bounty☆29Updated 4 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- DNS resolution tracing tool☆36Updated 4 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆42Updated 2 years ago
- A python approach to interacting with web shells.☆30Updated 5 years ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 5 months ago
- ☆27Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 3 years ago
- ☆24Updated 6 years ago
- Template used for my OSCP exam.☆29Updated 3 years ago
- Scanner for Cross-Site WebSocket Hijacking☆42Updated 5 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Updated 3 years ago
- Enumerate AWS permissions and resources.☆71Updated 3 years ago
- ☆46Updated 3 months ago
- ☆78Updated last week
- Pentesting notes☆19Updated last week
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated last year
- ☆27Updated 2 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆26Updated this week
- Subtron is a professional grade subdomain enumeration toolkit designed for security researchers, penetration testers, and bug bounty hunt…☆24Updated 3 months ago
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- Vulnerable Windows Application☆18Updated 2 years ago
- Autorev.sh generates reverse shell codes for reverse shell . Supports linux and windows☆17Updated 3 years ago