Trevohack / AYOLinks
Manage variables effectively when playing CTFs
☆10Updated last year
Alternatives and similar repositories for AYO
Users that are interested in AYO are comparing it to the libraries listed below
Sorting:
- A ring0 Loadable Kernel Module (Linux) to log all commnds run on the system.☆12Updated 7 months ago
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- This is a script written in Python that allows the exploitation of the Chamilo's LMS software security flaw described in CVE-2023-4220☆24Updated 10 months ago
- A C2 framework inspired by anime, made in python.☆11Updated 9 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆63Updated 7 months ago
- ☆62Updated this week
- A passive way to find backups/ sensitive information.☆80Updated 2 weeks ago
- A collection of useful tools and scripts were developed and gathered throughout the Offensive Security's PEN-300 (OSEP) course.☆118Updated this week
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆88Updated 3 weeks ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆137Updated 3 weeks ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆53Updated 5 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 7 months ago
- ☆24Updated last year
- ☆9Updated 8 months ago
- Grep subdomains from web pages.☆42Updated 3 months ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 5 months ago
- A list of all Active Directory machines from HackTheBox☆60Updated this week
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- TimeVault is a specialized automated tool designed to detect potential information disclosure vulnerabilities in web applications by leve…☆31Updated 4 months ago
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆142Updated 2 weeks ago
- A Powerful Recon Engine☆63Updated 6 months ago
- Welcome to the Bug Hunter's Wordlists repository! 🐛🔍 This repository serves as a comprehensive collection of essential wordlists utiliz…☆149Updated last year
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆115Updated 5 months ago
- ex-param is an automated tool designed for finding reflected parameters for XSS vulnerabilities. It crawls a target website, extracts GET…☆60Updated 3 months ago
- ☆27Updated last week
- ☆119Updated last year
- some of the commands I usually use when doing HTB machines☆43Updated last year
- ☆24Updated 2 months ago
- A New Approach to Directory Bruteforce with WaybackLister v1.0☆104Updated 2 weeks ago
- Sliver CheatSheet for OSEP☆78Updated last week