U53RW4R3 / SCPALinks
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your career as a hacker along with your journey.
☆33Updated 3 months ago
Alternatives and similar repositories for SCPA
Users that are interested in SCPA are comparing it to the libraries listed below
Sorting:
- RedTeam - Red Team Tools☆48Updated 3 years ago
- OWASP based Web Application Security Testing Checklist☆82Updated last year
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆52Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- Red Teaming tools and techniques☆56Updated 2 years ago
- Pentest/Red Team: Resources, repos and scripts.☆79Updated 2 months ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆41Updated 2 years ago
- Automate Scoping, OSINT and Recon assessments.☆103Updated 2 weeks ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆47Updated last year
- Collection of extra pentest tools for Kali Linux☆113Updated 4 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 2 months ago
- ☆25Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆136Updated last year
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 11 months ago
- ☆48Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆82Updated 5 years ago
- Enumeration & fingerprint tool☆24Updated last year
- Interactive shell to execute commands anonymously using Proxychains and Tor☆48Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆34Updated 5 years ago
- Web Hacking Cheat Sheet for Recon | Attacks | Tools & Resources☆25Updated 4 years ago
- Cyber Security Club, Offensive Operations Section (Red Team) learning pathway.☆29Updated 2 years ago
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Updated 2 years ago
- A multi web security purposes tool☆45Updated 8 months ago
- Next Generation DorX. Built by Dorks, for Dorks. 🤓☆110Updated 2 years ago