emadshanab / Red-Team-Resources-collectionLinks
☆76Updated 4 years ago
Alternatives and similar repositories for Red-Team-Resources-collection
Users that are interested in Red-Team-Resources-collection are comparing it to the libraries listed below
Sorting:
- Attack Surface Discovery Tool☆109Updated last year
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆152Updated last year
- Web Hacking and Red Teaming MindMap☆77Updated last month
- ☆157Updated 3 years ago
- A Burp Suite Extension for pentester and bug bounty hunters an to maintain checklist, map flows, write test cases and track vulnerabiliti…☆117Updated 2 years ago
- ☆68Updated 2 years ago
- ☆45Updated 2 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- A repository to host the subdomain wordlists from my blog https://medium.com/@nynan/what-i-learnt-from-reading-217-subdomain-takeover-bug…☆40Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆73Updated 2 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 4 months ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- ☆56Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆52Updated 3 years ago
- Here Are Some Bug Bounty Resource From Twitter☆101Updated 3 months ago
- ☆48Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- A burp suite extension that reviews backup, old, temporary and unreferenced files on web server for sensitive information (OWASP WSTG-CON…☆161Updated last year
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆96Updated 8 months ago
- Learning and hunting SQL injection bugs for 50 continuous days☆76Updated 3 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆34Updated last year
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- This repository contains proof of concept for zero days and CVEs that were found by Omar Hashem through Security Research☆45Updated 2 years ago
- ☆57Updated last year
- Advanced external automation on bug bounty programs by running the best set of tools to perform scanning and finding out vulnerabilities.☆102Updated 3 years ago
- Script for Bug Bounty☆29Updated 4 years ago
- ☆20Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago