dsopas / assessment-mindsetLinks
Security Mindmap that could be useful for the infosec community when doing pentest, bug bounty or red-team assessments.
☆746Updated 3 years ago
Alternatives and similar repositories for assessment-mindset
Users that are interested in assessment-mindset are comparing it to the libraries listed below
Sorting:
- This repository contains all the supplement material for the book "The art of sub-domain enumeration"☆655Updated 6 years ago
- Multi Tool Subdomain Enumeration☆724Updated 4 years ago
- A tool to link a domain with registered organisation names and emails, to other domains.☆844Updated last year
- Automated security reporting from markdown templates (HackerOne and Bugcrowd are currently the platforms supported)☆459Updated 6 years ago
- An automated approach to performing recon for bug bounty hunting and penetration testing.☆451Updated 5 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Updated 4 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆562Updated 2 years ago
- Content discovery wordlists generated using BigQuery☆573Updated 5 years ago
- This repository contains all the material from the talk "Esoteric sub-domain enumeration techniques" given at Bugcrowd LevelUp 2017 virtu…☆633Updated 6 years ago
- Easily turn single threaded command line applications into a fast, multi-threaded application with CIDR and glob support.☆1,267Updated 4 months ago
- Setup script for Regon-ng☆936Updated 4 years ago
- bXSS is a utility which can be used by bug hunters and organizations to identify Blind Cross-Site Scripting.☆546Updated 2 years ago
- A highly configurable Framework for easy automated web scanning☆379Updated 5 years ago
- Simple shell script for automated domain recognition with some tools☆304Updated 4 years ago
- Red Team Tactics, Techniques, and Procedures☆410Updated last month
- ☆826Updated last year
- a collection of handy bookmarks☆1,080Updated last year
- ☆276Updated 3 years ago
- An automation framework for running multiple open sourced subdomain bruteforcing tools (in parallel) using your own wordlists via Docker …☆256Updated 4 years ago
- ☆601Updated last year
- ReconPi - A lightweight recon tool that performs extensive scanning with the latest tools.☆728Updated 3 years ago
- stuff i'm willing to share with the world lol☆170Updated 2 years ago
- Repository for hosting my research papers☆512Updated last year
- Bug Bounty Guide is a launchpad for bug bounty programs and bug bounty hunters.☆469Updated 2 years ago
- A virtual host scanner that performs reverse lookups, can be used with pivot tools, detect catch-all scenarios, work around wildcards, al…☆1,248Updated 3 weeks ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆470Updated 5 years ago
- ☆433Updated 2 years ago
- Find AWS S3 buckets and test their permissions.☆392Updated 2 years ago
- A script to enumerate virtual hosts on a server.☆693Updated 7 years ago