U53RW4R3 / SCPALinks
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your career as a hacker along with your journey.
☆33Updated 3 months ago
Alternatives and similar repositories for SCPA
Users that are interested in SCPA are comparing it to the libraries listed below
Sorting:
- Pentest/Red Team: Resources, repos and scripts.☆72Updated last month
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- Red Teaming tools and techniques☆54Updated 2 years ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆133Updated last year
- Automate Scoping, OSINT and Recon assessments.☆96Updated 7 months ago
- ☆44Updated last year
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 9 months ago
- RedTeam - Red Team Tools☆47Updated 2 years ago
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Social Engineering Browser Update Attack.☆56Updated last year
- Postman OSINT tool to extract creds, token, username, email & more from Postman Public Workspaces☆163Updated 4 months ago
- Receive email alerts on successful ssh logins based on a predefined IP whitelist OR a predefined IP country origin whitelist (using gmail…☆23Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A repository with informtion related to Cloud Osint☆109Updated 5 months ago
- Collection of my talks and workshops about hacking & cybersecurity☆29Updated 6 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 6 months ago
- Simple Python script that will set up a PHP server for stealing cookies - and provided the payload needed.☆36Updated 7 months ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆110Updated 8 months ago
- Seekolver is a tool focused on attack-surface mapping. It performs searches for subdomains associated with root domains and root domains …☆39Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps.☆65Updated last year
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Crawls URL to get a better image of what is tied to a website.☆33Updated 2 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆105Updated 2 years ago