U53RW4R3 / SCPA
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your career as a hacker along with your journey.
☆24Updated last week
Related projects: ⓘ
- OWASP based Web Application Security Testing Checklist☆64Updated 2 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆92Updated last year
- Scripts for offensive security☆59Updated 3 weeks ago
- ☆25Updated last month
- ☆63Updated last year
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆122Updated 2 months ago
- ☆40Updated 2 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆172Updated 2 months ago
- Resources, repos and scripts for pentesters and bug bounty.☆55Updated last week
- Collection of extra pentest tools for Kali Linux☆93Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆124Updated 2 months ago
- Automate Scoping, OSINT and Recon assessments.☆89Updated 2 weeks ago
- Red Teaming tools and techniques☆45Updated last year
- Some Dorking resources☆29Updated last month
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆101Updated 3 months ago
- ☆72Updated last year
- WhatMail is a command-line tool that analyzes the header of an email and provides detailed information about various fields.☆125Updated last year
- Crawls URL to get a better image of what is tied to a website.☆31Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆72Updated 3 years ago
- Harness the Power of AI for all your reporting needs.☆28Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆59Updated 6 months ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆83Updated 2 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated last year
- List of Command&Control (C2) software☆34Updated last year
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated last year
- A repository with informtion related to Cloud Osint☆72Updated 6 months ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆22Updated 10 months ago
- ☆35Updated this week
- Simple HTTP listener for security testing☆112Updated 11 months ago
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated last year