botesjuan / PenTestMethodology
PenTest Methodology
☆14Updated 2 months ago
Alternatives and similar repositories for PenTestMethodology:
Users that are interested in PenTestMethodology are comparing it to the libraries listed below
- Template used for my OSCP exam.☆26Updated 2 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv1 from eLearnSecurity☆23Updated 4 years ago
- ☆45Updated 7 years ago
- Notes for CRTP☆39Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆89Updated last year
- ☆48Updated 3 years ago
- Script for Bug Bounty☆28Updated 3 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆70Updated 6 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆78Updated 4 years ago
- OSWE Preparation☆37Updated 5 years ago
- Vulnerable SAML infrastructure training applicaiton☆50Updated last year
- Wordlist to bruteforce for LFI☆119Updated 5 years ago
- HTTP verb tampering & methods enumeration☆55Updated 2 years ago
- ☆38Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 2 years ago
- Advanced Reconnaissance and Web Application Discovery☆78Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- Preparation for OSWE☆42Updated 4 years ago
- ☆29Updated 5 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆85Updated 7 months ago
- Misc bounty and vulndisc things☆83Updated 4 years ago
- ☆17Updated 3 years ago
- Information Security Information From Web☆26Updated 4 months ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- User enumeration and password spraying tool for testing Azure AD☆69Updated 2 years ago
- ☆44Updated 3 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆58Updated 3 years ago