cyver-core / ultimate-pentest-tools-listLinks
The following include a list of pentest tools available across the web. Many are free and even open source, others are premium tools and require a monthly or yearly subscription. We’ll note when pentest tools aren’t free.
☆42Updated 2 months ago
Alternatives and similar repositories for ultimate-pentest-tools-list
Users that are interested in ultimate-pentest-tools-list are comparing it to the libraries listed below
Sorting:
- Shodan Dorks☆459Updated 8 months ago
- Here are the most interesting Shodan dorks (according to me)☆93Updated last year
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.☆373Updated last year
- Script that automates the installation of the main tools used for web application penetration testing and Bug Bounty.☆224Updated last year
- XSSRocket it is a tool designed for offensive security and XSS (Cross-Site Scripting) attacks.☆151Updated last year
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆68Updated last month
- ShodanX is a tool to gather information of targets using shodan dorks⚡.☆444Updated 5 months ago
- Docker - Ubuntu with a bunch of PenTesting tools and wordlists☆283Updated 7 months ago
- An auto-updating list of shodan dorks with info on the amount of results they return!☆281Updated this week
- checklist for testing the web applications☆274Updated 2 years ago
- Weaponizing WaybackUrls for Recon, BugBounties , OSINT, Sensitive Endpoints and what not☆469Updated 2 months ago
- A list of dorks for the Netlas.io search engine, with which you can find millions of objects in the boundless IoE. Contains queries to se…☆195Updated 2 months ago
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆247Updated 3 months ago
- HaxorHandbook is the ultimate cheat sheet for cybersecurity enthusiasts looking to up their game. Our comprehensive guide includes must-h…☆80Updated last year
- ☆130Updated 4 months ago
- This Repositories contains list of One Liners with Descriptions and Installation requirements☆493Updated 3 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆300Updated last year
- Your Guide to browse Onine sites☆146Updated last year
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆326Updated 3 years ago
- Shodan Dorks 2023☆240Updated 9 months ago
- A Personal Collection of Infosec Dorks☆201Updated 2 years ago
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆76Updated 8 months ago
- A Tool for Bug Bounty Hunters that uses Passive and Active Techniques to fetch URLs as a strong Recon, so you can then create Attack Vect…☆75Updated last year
- ShodanSpider is an open-source tool for interacting with Shodan. It lets you search and extract data from Shodan without an API key, offe…☆157Updated 7 months ago
- Web Application Penetration Testing☆129Updated 5 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆375Updated last year
- Usefull telegram for data leaks, tutorials, free course.☆105Updated last year
- Shodan Dorks☆520Updated 2 years ago
- Bug Bounty Tools used on Twitch - Recon☆314Updated last year