emadshanab / Red-Team-Resources-collectionLinks
☆76Updated 4 years ago
Alternatives and similar repositories for Red-Team-Resources-collection
Users that are interested in Red-Team-Resources-collection are comparing it to the libraries listed below
Sorting:
- ☆157Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- Attack Surface Discovery Tool☆108Updated 10 months ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆116Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆72Updated 2 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 3 months ago
- Web Hacking and Red Teaming MindMap☆77Updated this week
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆129Updated 3 years ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆162Updated last year
- ☆56Updated 2 years ago
- ☆57Updated last year
- HTTP verb tampering & methods enumeration☆62Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆51Updated 3 years ago
- ☆171Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 7 months ago
- Sample Obsidian's vault for web pentesting☆98Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago
- A burp suite extension that enumerates infrastructure and application admin interfaces (OTG-CONFIG-005)☆121Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- ☆68Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 7 months ago
- ☆68Updated 2 years ago
- ☆20Updated 3 years ago
- Automated Subdomain Enumeration and Scanning Tool☆116Updated last year
- I collected it to help the bug hunter get a reward☆58Updated 2 years ago
- The scripts I write to help me on my bug bounty hunting