U53RW4R3 / SCPALinks
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your career as a hacker along with your journey.
☆33Updated 2 months ago
Alternatives and similar repositories for SCPA
Users that are interested in SCPA are comparing it to the libraries listed below
Sorting:
- A Python http(s) server designed to assist in red teaming activities such as receiving intercepted data via POST requests and serving con…☆132Updated last year
- ☆44Updated last year
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆178Updated last year
- Pentest/Red Team: Resources, repos and scripts.☆71Updated this week
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated 11 months ago
- Red Teaming tools and techniques☆54Updated 2 years ago
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆132Updated last year
- ☆65Updated 2 years ago
- HackersPlayground—a curated collection of cybersecurity resources, tools, and methodologies for penetration testers.☆24Updated 4 months ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- RedTeam - Red Team Tools☆47Updated 2 years ago
- A simple utility to quickly gather historic Port and CVE exposures from an IP range.☆39Updated last year
- A simple pentest container equipped with common python pentest tools.☆41Updated 5 months ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆31Updated 2 years ago
- Red Team Guides☆139Updated last year
- Enumeration & fingerprint tool☆24Updated last year
- Automate Scoping, OSINT and Recon assessments.☆95Updated 6 months ago
- ADAT is a small tool used to assist CTF players and Penetration testers with easy commands to run against an Active Directory Domain Cont…☆97Updated 2 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- A powerful tool that utilizes the technique of google dorking to search for specific information on the internet.☆104Updated last year
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆80Updated 2 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆109Updated 7 months ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 5 months ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆25Updated 3 years ago
- Hide an IP address in scripts using hex/decimal/octal conversions☆69Updated 4 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated last month
- Collection of extra pentest tools for Kali Linux☆109Updated 2 years ago