d3m0nrul3s / darkLinks
☆13Updated last year
Alternatives and similar repositories for dark
Users that are interested in dark are comparing it to the libraries listed below
Sorting:
- Play Hack The Box directly on your system.☆51Updated 3 months ago
- Offline command line tool that searches for GTFOBins binaries that can be used to bypass local security restrictions in misconfigured sys…☆46Updated last year
- NMAP-AI: AI-Powered Network Scanning & Automation Platform 🤖 Revolutionizing network scanning with AI-powered automation, intelli…☆20Updated this week
- Reverse shell cheat sheet☆27Updated 2 years ago
- OWASP based Web Application Security Testing Checklist☆78Updated last year
- Compromise a web application and delve deeper into the network to access hosts that you cannot directly reach from your attack host using…☆21Updated last year
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Updated last year
- Elevate your bookmarking game with my latest Bookmark Toolkit. Engineered for ethical bookmarking and enhanced web exploration, it delive…☆37Updated 4 months ago
- API Penetration Testing Notes☆16Updated 3 months ago
- A collection of config files for linux focusing on hackthebox theme☆50Updated 7 months ago
- Oty is a fast, customizable, CLI tool designed to streamline your Bug Bounty and Pentesting workflows. Powered by a simple yet flexible Y…☆23Updated 6 months ago
- ☆59Updated last month
- Making your own CTF☆26Updated 4 years ago
- I used the Templater community plugin in obsidian to automatically populate IP,username,password☆42Updated last year
- This repo shares blue team security notes and resources for detecting and preventing cyber attacks. Topics covered include email, file, l…☆46Updated 4 months ago
- Fixes corrupted Magic Bytes for PNG, JPG and JPEG☆10Updated 4 years ago
- This repository contains a basic custom lab environment designed to demonstrate and explore SQL injection vulnerabilities. The lab provid…☆10Updated last year
- Dump files via Directory Traversal, LFI, Arbitrary File Read in a breeze with the help of ffuf☆18Updated last year
- ☆46Updated 5 months ago
- A powerful CLI tool that uses ZoomEye to search exposed services, gather intelligence, and automate reconnaissance.☆45Updated 2 months ago
- ThreatTracer - A python Script to identify CVE by name & version and more by @FR13ND0x7F☆137Updated 2 months ago
- This is my personal repo, which includes bug bounty tips, a collection of tools, one-liners, and other resources I personally prefer whil…☆56Updated 3 months ago
- :)))))☆46Updated 3 weeks ago
- In this repo, I have included the tools that i used for my everyday penetration tests, if you have just installed kali and lost your tool…☆29Updated 9 months ago
- These are installation notes based on Mayfly's installation notes. They are more streamlined for Vagrant as I did not take the Docker rou…☆28Updated last year
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆71Updated 9 months ago
- Study notes to get eCPPT Certification. Join the community on Discord☆17Updated last year
- Some HTB, THM, CTF, Penetration Testing, cyber security related resource and writeups☆26Updated 2 months ago
- ☆52Updated last year
- Penstaller: A Python tool to automate the installation of essential bug bounty and pentesting tools. With one command, it sets up tools f…☆15Updated 4 months ago