ghostsec420 / SCPALinks
Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker on your journey.
☆279Updated 7 months ago
Alternatives and similar repositories for SCPA
Users that are interested in SCPA are comparing it to the libraries listed below
Sorting:
- A command-line tool to query the DeHashed API. Easily search for various parameters like usernames, emails, hashed passwords, IP addresse…☆248Updated 3 months ago
- A compact guide to network pivoting for penetration testings / CTF challenges.☆215Updated last year
- ☆123Updated last year
- An in-depth guide to help people who are new to penetration testing or red teaming and are looking to gain an overview of the penetration…☆147Updated 9 months ago
- SecretOpt1c is a Red Team tool that helps uncover sensitive information in websites using ACTIVE and PASSIVE Techniques for Superior Accu…☆237Updated last year
- Shodan Dorks 2023☆242Updated 9 months ago
- A collection of red teaming and adversary emulation related tools, scripts, techniques, notes, etc☆316Updated last year
- Red Team Guides☆140Updated last year
- A RedTeam Toolkit☆407Updated 2 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆181Updated last year
- My public notes about offensive security☆164Updated last month
- This repository contain a CheatSheet for OSWP & WiFi Cracking.☆327Updated 3 years ago
- notes and ramblings from my OSCP/PenTesting Studies☆94Updated 2 years ago
- Automate the scanning and enumeration of machines externally while maintaining complete control over scans shot to the target. Comfortabl…☆165Updated 2 months ago
- ☆138Updated 3 years ago
- This repository contains a curated list of websites and repositories featuring pentest & red-team resources such as cheatsheets, write-up…☆68Updated last month
- Nucleimonst3r is a powerful vulnerability scanner that can help Bug Bounty Hunters find low hanging fruit vulnerabilities for known CVEs …☆254Updated 6 months ago
- Demonized Shell is an Advanced Tool for persistence in linux.☆419Updated 9 months ago
- Tools & Resources for Cyber Security Operations☆261Updated 5 months ago
- Simple HTTP listener for security testing☆117Updated 11 months ago
- LFI-FINDER is an open-source tool available on GitHub that focuses on detecting Local File Inclusion (LFI) vulnerabilities☆301Updated last year
- The Havoc Framework☆60Updated 3 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆87Updated 2 weeks ago
- ☆433Updated 3 years ago
- ☆78Updated 2 years ago
- List of red team resources☆96Updated 7 years ago
- Script for generating revshells☆475Updated last year
- This a notes/handbook i made and gathered from a great resources on the internet. It consist of a very detailed cheat sheets and useful c…☆162Updated 2 years ago
- Shodan Dorks☆459Updated 8 months ago
- Remote persistent 🔑Logger for Windows and Linux☆295Updated 2 years ago