edurekavivekh / linux-contentLinks
☆9Updated 5 years ago
Alternatives and similar repositories for linux-content
Users that are interested in linux-content are comparing it to the libraries listed below
Sorting:
- eJPT CheatSheet☆28Updated 4 years ago
- ☆100Updated last year
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- ☆70Updated 4 years ago
- ☆43Updated 3 years ago
- XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible lin…☆21Updated 5 years ago
- ☆14Updated 5 years ago
- Google Dorks and keywords for bug hunters.☆14Updated 3 years ago
- Web Application Penetration Testing☆113Updated last month
- eCPPTv2 Notes☆13Updated 3 years ago
- Notes on ECPPT☆22Updated 6 years ago
- Simple C# Port Scanner (Multi-Threaded)☆49Updated 4 years ago
- 0xbro's cheatsheets and CTFs notes☆52Updated this week
- The repo contains all the slide deck that was used during my presentation at various webinars, conferences, and meetups.☆57Updated 4 years ago
- A collection of automation scripts for bug bounty hunting.☆31Updated 2 years ago
- Bug-hunting Automation☆36Updated last year
- Quick and dirty script to check for No RL☆30Updated 3 months ago
- Scripts created to use with the OSCP exercises☆47Updated 2 years ago
- Very Vulnerable Management API (VVMA) is a deliberately insecure RESTful API built with Node.js for educational and testing purposes. It …☆59Updated this week
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆52Updated 4 years ago
- A collection of custom built scan templates for automated vuln scanning (nuclei, Burp, etc.)☆40Updated 2 years ago
- Regex patterns for manual application source code review☆28Updated 4 years ago
- Tips and Tricks for OSCP and Beyond!☆25Updated last year
- A collection of solutions for every PortSwigger Academy Lab (in progress)☆96Updated 3 years ago
- ☆31Updated last month
- A collection of lab reports of the Penetration Testing Student course by INE which prepares you for the eJPT.☆46Updated 3 years ago
- My CEH Practical Preparation☆25Updated 4 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated last week
- Python Duo Push API☆36Updated last week
- ☆57Updated last year