am0nt31r0 / Penetration-Testing-Mind-MapView external linksLinks
To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.
☆47Apr 4, 2019Updated 6 years ago
Alternatives and similar repositories for Penetration-Testing-Mind-Map
Users that are interested in Penetration-Testing-Mind-Map are comparing it to the libraries listed below
Sorting:
- Web Hacking and Red Teaming MindMap☆78Dec 24, 2025Updated last month
- With the help of this docker image, you can easily access PEzor on your system!☆15Mar 10, 2022Updated 3 years ago
- Code injection is a technique where a process can insert a part of or all of its code from its own running process into another target pr…☆14Jun 15, 2023Updated 2 years ago
- Install mostly used pentesting and CTF tools in Ubuntu 18.04 without adding any extra repository, preventing any crashes in repositories.☆15Apr 29, 2020Updated 5 years ago
- Talk slides and material☆37Mar 24, 2024Updated last year
- just some notes on different computer science topics (linux, windows, networks, cybersecurity, machine learning...)☆19Dec 29, 2021Updated 4 years ago
- Dive into a handpicked selection of tools, guides, and tips tailored for beginners in Bug Bounty and Penetration Testing. 🐛🛡️☆38Aug 14, 2024Updated last year
- Attack Surface Discovery Tool☆110Sep 17, 2024Updated last year
- Creating CS:GO server with skins, ws, gloves, knife, rank, rs, etc. both with a bash file and using a docker file.☆15Sep 11, 2022Updated 3 years ago
- What's the Red Team doing to my Linux Box? - BSides Vienna 2024☆17Nov 23, 2024Updated last year
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- Pentest Checklists☆20Aug 23, 2020Updated 5 years ago
- razorAP, Bash and Python tool used to generate Fake Access Points for Wi-Fi networks with 802.1X authentication.☆22Sep 18, 2024Updated last year
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆29Jun 27, 2022Updated 3 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42May 9, 2020Updated 5 years ago
- Enumerate AWS cloud resources based on provided credential☆51May 11, 2022Updated 3 years ago
- My personal collection of webshells for educational purposes. Most are custom implementations/adaptations of stuff I found on the interne…☆21May 20, 2024Updated last year
- ☆19Dec 12, 2023Updated 2 years ago
- Tools & TTP's for Active Directory Red Teaming☆30Dec 22, 2024Updated last year
- ☆24Apr 16, 2019Updated 6 years ago
- Evtx Log (xml) Browser☆57Mar 12, 2023Updated 2 years ago
- Exploit of RealVNC VNC Server☆27Oct 18, 2022Updated 3 years ago
- ☆27May 14, 2022Updated 3 years ago
- ATLAS - Malware Analysis Description☆21Jun 9, 2023Updated 2 years ago
- Magic tricks using grep, sed and awk☆27Jul 28, 2022Updated 3 years ago
- Automating EDR Testing with reference to MITRE ATTACK via Cobalt Strike [Purple Team].☆155Mar 27, 2023Updated 2 years ago
- commands☆27Nov 5, 2020Updated 5 years ago
- A python port of CCob's ThreadlessInject☆25Mar 18, 2023Updated 2 years ago
- ☆121Sep 13, 2023Updated 2 years ago
- Modular command-line tool to parse, create and manipulate JWT tokens for hackers☆105Mar 17, 2023Updated 2 years ago
- ☆35Nov 30, 2023Updated 2 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Jun 10, 2019Updated 6 years ago
- tunnel port to port traffic over an obfuscated channel with AES-GCM encryption.☆68Nov 22, 2019Updated 6 years ago
- Opening the door, one reverse shell at a time☆185Apr 22, 2021Updated 4 years ago
- a mindmap on pentest #pentestmindmap #oscp #lpt #ecsa #ceh #bugbounty☆269Jun 27, 2025Updated 7 months ago
- AAD related enumeration in Nim☆132Sep 7, 2023Updated 2 years ago
- This repo tries to explain complex security vulnerabilities in simple terms that even a five-year-old can understand!☆368Aug 17, 2023Updated 2 years ago
- 30 Days of Code HackerRank☆13Jun 21, 2024Updated last year