U53RW4R3 / SCPA
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your career as a hacker along with your journey.
☆28Updated this week
Alternatives and similar repositories for SCPA:
Users that are interested in SCPA are comparing it to the libraries listed below
- Pentest/Red Team: Resources, repos and scripts.☆62Updated 2 weeks ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆51Updated 10 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆32Updated 4 years ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆37Updated last year
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆76Updated 4 years ago
- A summary of the most abbreviations I encountered so far☆18Updated this week
- ☆64Updated last year
- Red Teaming tools and techniques☆48Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated last year
- Retrieve all mails of users related to a git repository, a git user or a git organization☆48Updated 8 months ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆65Updated last year
- The provided Python program, Nim-Backdoor.py, generates a Nim program that operates as a backdoor, allowing remote command execution via …☆32Updated 6 months ago
- Collection of extra pentest tools for Kali Linux☆99Updated last year
- Enumeration & fingerprint tool☆24Updated 10 months ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆38Updated last year
- OWASP based Web Application Security Testing Checklist☆68Updated 6 months ago
- Automate Scoping, OSINT and Recon assessments.☆94Updated last week
- Cobalt Strike is threat emulation software. Red teams and penetration testers use Cobalt Strike to demonstrate the risk of a breach and e…☆13Updated 2 years ago
- ☆42Updated 6 months ago
- ☆31Updated 3 weeks ago
- A simple pentest container equipped with common python pentest tools.☆41Updated last month
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated last year
- A repository with informtion related to Cloud Osint☆80Updated this week
- Mass bruteforce authentication of network protocols☆45Updated last year
- Garudaastra Tool is based on python3 to find cameras around the world☆28Updated last year
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆68Updated 10 months ago
- ☆43Updated last week
- ☆24Updated 2 years ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆94Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year