d3m0nrul3s / darkLinks
☆13Updated last year
Alternatives and similar repositories for dark
Users that are interested in dark are comparing it to the libraries listed below
Sorting:
- Play Hack The Box directly on your system.☆50Updated 3 weeks ago
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 3 months ago
- Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible Y…☆23Updated 7 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆57Updated 4 months ago
- ☆42Updated 3 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed…☆73Updated 6 months ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆76Updated this week
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆49Updated 2 months ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆82Updated 2 weeks ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆30Updated 10 months ago
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆15Updated 5 months ago
- A collection of config files for linux focusing on hackthebox theme☆51Updated 8 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆72Updated 10 months ago
- bWAPP Docker Image☆52Updated 3 years ago
- NextSploit is a command-line tool designed to detect and exploit CVE-2025-29927, a security flaw in Next.js