☆17Jul 17, 2023Updated 2 years ago
Alternatives and similar repositories for offsec-notes
Users that are interested in offsec-notes are comparing it to the libraries listed below
Sorting:
- ☆22Dec 22, 2022Updated 3 years ago
- Flowlyt is a security analyzer that scans GitHub Actions workflows to detect malicious patterns, misconfigurations, and secrets exposure,…☆15Feb 10, 2026Updated 2 weeks ago
- Scripts and things.☆13Jan 23, 2026Updated last month
- Port Knocking Sequence Discovery Scanner☆17Oct 19, 2016Updated 9 years ago
- This is repo with my custom zsh completion files for pentesting tools, which do not exist in zsh and oh-my-zsh by default☆12Oct 23, 2025Updated 4 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- ☆13Aug 10, 2022Updated 3 years ago
- toolings for pentester to makes their life easier☆11Feb 25, 2023Updated 3 years ago
- Repository for writeups of ctf challenges☆11Jan 28, 2024Updated 2 years ago
- Gitlab CI/CD Templates for build,test,deploy to your infra☆12Aug 15, 2024Updated last year
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- Web Crawler for Identifying Entry Points☆11Mar 26, 2024Updated last year
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Blog☆10Jul 18, 2023Updated 2 years ago
- Solution descriptions for all the problems on foreverCTF☆11Aug 12, 2024Updated last year
- ☆15Nov 15, 2023Updated 2 years ago
- Burp Suite Pro extension☆11May 26, 2017Updated 8 years ago
- ☆11Oct 21, 2024Updated last year
- A Productivity-Boosting Burp Suite extension written in Kotlin that enables persistent sticky session handling in web application testing…☆12Oct 8, 2025Updated 4 months ago
- An python script that use apkleaks to scan the android application over web☆11Jun 2, 2022Updated 3 years ago
- A Threat hunter's playbook to aid the development of techniques and hypothesis for hunting campaigns.☆12Feb 26, 2024Updated 2 years ago
- Python application to scan user's installed browsers for secrets such as stored passwords and cookies.☆14Jun 16, 2021Updated 4 years ago
- AI modular structure that provides automation-based attack and penetration☆14May 10, 2024Updated last year
- Resources for I Want My EIP, presented at Derbycon 2017☆11Sep 23, 2017Updated 8 years ago
- Public release of the challenge repo from SunshineCTF 2022.☆15Dec 6, 2022Updated 3 years ago
- ☆13Mar 12, 2022Updated 3 years ago
- I have created this dashboard to track oscp preparation. I have used several resources and has been mentioned in dashboard. Tjnull's blog…☆13Jul 8, 2022Updated 3 years ago
- ☆11Nov 8, 2022Updated 3 years ago
- Automated authorization checks with multiple headers tool written in golang☆11Jan 3, 2024Updated 2 years ago
- Azure DevOps is an end-to-end software development platform.☆13Aug 25, 2025Updated 6 months ago
- Baseline a Windows System against LOLBAS☆71Feb 2, 2026Updated 3 weeks ago
- AI featured threat modeling and security review project☆17Nov 17, 2024Updated last year
- Download images from URLs within a CSV☆13Jan 6, 2021Updated 5 years ago
- Web scraping | Website cloner | Path Traversal Scanner☆16Sep 27, 2025Updated 5 months ago
- Image Payload Creating/Injecting tools☆13Jun 6, 2021Updated 4 years ago
- CPSA exam prep resources☆17Sep 11, 2024Updated last year
- OrFinder is a tool which scan the internet to find open relay SMTPs☆15Aug 7, 2017Updated 8 years ago
- A brief list of all the red teaming scenarios that can be easily used to validate your current company infrastructure. Scenarios are comp…☆17Jul 26, 2024Updated last year
- This repository provides examples of Vulnerable and Mitigated code as per CWE Categorization.☆23May 4, 2024Updated last year