Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare as a hacker on your journey.
☆283Mar 5, 2025Updated 11 months ago
Alternatives and similar repositories for SCPA
Users that are interested in SCPA are comparing it to the libraries listed below
Sorting:
- How to install Kali in VirtualBox☆14May 3, 2024Updated last year
- Save time on collecting subdomains, attributing IPs and then basic nmap scan.☆14Oct 30, 2022Updated 3 years ago
- GhostSec Scam Detection Tool☆15Feb 11, 2021Updated 5 years ago
- New Blood Project☆81Apr 3, 2024Updated last year
- Sophisticated cyber penetration attacks is a series of advanced techniques, notes and guidance that will help you to prepare in your car…☆33Updated this week
- Auto Scanner and Auto exploiter web app tool V4 Leaked by #GhostSec☆63Jun 5, 2021Updated 4 years ago
- Free courses☆72Apr 1, 2023Updated 2 years ago
- Self-installation for ethical hacking☆32Sep 7, 2023Updated 2 years ago
- Built to learn ethical hacking on your own☆142May 3, 2024Updated last year
- My personal collection of nuclei templates made for fuzzing.☆29Sep 6, 2024Updated last year
- Automated task after new installation of Kali Linux + NewBlood helper☆39Sep 7, 2023Updated 2 years ago
- A care package of useful bofs for red team engagments☆53Dec 6, 2024Updated last year
- ترجمه پروژه NewBlood به فارسی. زنان، زندگی، آزادی.☆39Mar 12, 2023Updated 2 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- ☆715Mar 22, 2024Updated last year
- Collect XSS vulnerable parameters from entire domain.☆13Jul 29, 2022Updated 3 years ago
- ☆13Sep 8, 2024Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆72Dec 28, 2023Updated 2 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Jan 2, 2021Updated 5 years ago
- Materials for the workshop "Red Team Ops: Havoc 101"☆394Oct 6, 2024Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- This repository contains a mindmap for different techniques for using Censys Search☆15Sep 17, 2025Updated 5 months ago
- Winterfell hunt is a python script to perform auto threat hunting for malicious activities in windows OS based on collected data by winte…☆15Jul 23, 2020Updated 5 years ago
- Red Team Cheatsheet in constant expansion.☆1,263Dec 28, 2023Updated 2 years ago
- ☆62Dec 13, 2025Updated 2 months ago
- Collection of OPSEC Tradecraft and TTPs for Red Team Operations☆321Feb 1, 2026Updated last month
- Repo containing my personal walkthroughs of PMAT Labs i.e. PMAT Malware Samples.☆43Mar 23, 2022Updated 3 years ago
- ☆12Dec 26, 2021Updated 4 years ago
- Writeup on how to access Wifi pineapple GUI through non-management APs and fuzz web app login credentials☆15Dec 1, 2021Updated 4 years ago
- Advanced web fuzzer with machine learning capabilities, stealth features, and intelligent pattern generation.☆18Mar 29, 2025Updated 11 months ago
- A curated list of resources for learning web3 hacking/Security☆202Jan 19, 2023Updated 3 years ago
- Red Team tools, infrastructure, and hardware weaponized☆109Dec 29, 2025Updated 2 months ago
- a tool to help operate in EDRs' blind spots☆767Dec 2, 2024Updated last year
- Some notes and examples for cobalt strike's functionality☆1,127Feb 8, 2022Updated 4 years ago
- Red Teaming Tactics and Techniques☆13Feb 10, 2022Updated 4 years ago
- OSINT tool to extract email addresses and other useful info from various GitHub sources.☆48Aug 26, 2025Updated 6 months ago
- Dynamic Labs is an open source tool aimed at red teamers and pentesters for the quick deployment of flexible, transient and cloud-hosted …☆63Jan 12, 2024Updated 2 years ago
- Hide your payload in DNS☆615May 3, 2023Updated 2 years ago