ZishanAdThandar / WriteUpsLinks
CTF and Bug Bounty Hunting WriteUps.
☆21Updated last month
Alternatives and similar repositories for WriteUps
Users that are interested in WriteUps are comparing it to the libraries listed below
Sorting:
- SubCerts is a simple tool that uses certificate transparency logs (via crt.sh) to extract subdomains of a given domain.☆74Updated 3 months ago
- Chrome extension tool for OSINT & Recon☆56Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆40Updated last year
- Web Hacking and Red Teaming MindMap☆76Updated 2 months ago
- Probuster : A Python based Web Application Penetration testing tool for Information Gathering⚡.☆60Updated 11 months ago
- A simple pentest container equipped with common python pentest tools.☆42Updated 8 months ago
- "XSS automation tool helps hackers identify and exploit cross-site scripting vulnerabilities in web apps. Tests for reflected and persist…☆92Updated last year
- Red Teaming tools and techniques☆55Updated 2 years ago
- This repository contains the best fuzzing wordlist files☆34Updated 11 months ago
- 📲 Python project developed to help on the process of searching for vulnerabilities in Android mobile applications. It takes the APK file…☆134Updated 2 weeks ago
- This is an UNOFFICIAL guide and general list of cheatsheets, references, and walkthroughs aligned with the OffSec OSCP exam process☆27Updated last year
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- It is a tool for scanning and exploiting the famous SQL injection vulnerability in more than millions of sites. The exploit was programme…☆67Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- Gixposed is a powerful command-line tool designed to search the commit history of Git repositories for sensitive information, such as API…☆38Updated 10 months ago
- Tool for bypassing logins vulnerable against SQL injection☆46Updated last year
- A single script to install important Pentesting Tools and wordlists on Debian based Linux OS.☆47Updated 2 weeks ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆42Updated last year
- This small script can download or update all the GitHub repo of your choice.☆22Updated last year
- Mining URLs from Wayback Machine for bug hunting/fuzzing/further probing☆55Updated 2 years ago
- ScanExp automates the scanning of any machine's open ports via the ip address and performs a brute force attack on ports 20, 21 for the F…☆26Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆54Updated last year
- PassMute - A multi featured Password Transmutation/Mutator Tool☆53Updated 2 years ago
- Red teaming is an attack technique used in cyber security to test how an organisation would respond to a genuine cyber attack. It is done…☆26Updated 6 months ago
- A fast subdomain takeover tool☆84Updated last year
- [BASH] Bounty Meter is a command-line utility tool designed for bug bounty hunters to define their bounty target for a year, maintain and…☆33Updated 2 years ago
- Resources for Mobile Application Testing 📓☆69Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago