forktheplanet / Pentesting-notes
Pentesting notes
☆17Updated 2 months ago
Alternatives and similar repositories for Pentesting-notes:
Users that are interested in Pentesting-notes are comparing it to the libraries listed below
- Bash script to generate reverse shell payloads☆19Updated last year
- ☆14Updated 4 years ago
- ☆20Updated 3 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- King of Bug Bounty Tips Simple Tool☆13Updated 3 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- An advanced multithreaded admin panel finder written in python.☆14Updated 4 years ago
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- Noob Penetration tester☆11Updated 11 months ago
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆24Updated 8 months ago
- ☆24Updated 6 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- WebApp intentionally made vulnerable to Race Condition for practicing Race Condition☆25Updated 3 years ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- your bestfried for finding LinkedIn Employees on github☆16Updated 2 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- Assorted scripts I made for Red Teaming / Pen Testing☆13Updated 10 months ago
- ☆20Updated 3 years ago
- ☆29Updated 2 years ago
- A spreadsheet designed to automatically generate Key Performance Indicators (charts) for Cyber Security Services based on documented data…☆30Updated 9 months ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- New Framework Red Team Operations☆18Updated 3 years ago
- C2Matrix Automation☆11Updated last year
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- Offensive Security Wireless Professional☆17Updated 5 years ago
- Just another vulnerable web application.☆36Updated 9 months ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated 2 years ago