Penetration Testing Learning Guide
☆147Jun 8, 2025Updated 10 months ago
Alternatives and similar repositories for Pentesting-Roadmap
Users that are interested in Pentesting-Roadmap are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A quick bug bounty guide for beginners☆92May 3, 2025Updated 11 months ago
- SecretFinder - A python script for find sensitive data (apikeys, accesstoken,jwt,..) and search anything on javascript files☆11Mar 29, 2021Updated 5 years ago
- Maximize your bug bounty hunting efficiency with exp0s3d - the open-source tool that automates initial reconnaissance and vulnerability d…☆86Mar 20, 2025Updated last year
- fsociety Hacking Tools Pack – A Penetration Testing Framework☆14Aug 8, 2024Updated last year
- Web Security Scanner☆382Nov 13, 2025Updated 5 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- RobotScraper is a simple tool written in Python to check each of the paths found in the robots.txt file and what HTTP response code they …☆14Jul 23, 2024Updated last year
- 「📖」Tool created to extract metadata from a domain☆14Dec 7, 2024Updated last year
- Multi-cloud OSINT tool. Enumerate public resources in AWS, Azure, and Google Cloud.☆16Jul 11, 2025Updated 9 months ago
- Scapy 802.1X exploitation framework.☆20Mar 2, 2021Updated 5 years ago
- OpenSSH Vulnerabilities Scanner: Bulk Scanning Tool for 21 different OpenSSH CVEs.☆23Aug 25, 2024Updated last year
- Advanced test for proxy & waf☆14Feb 10, 2026Updated 2 months ago
- ☆18Apr 26, 2025Updated 11 months ago
- Javascript sourcemaps enumeration tool☆15Dec 19, 2024Updated last year
- Make your Kali Repository Run Faster using Bash Script☆14Dec 16, 2024Updated last year
- Deploy open-source AI quickly and easily - Bonus Offer • AdRunpod Hub is built for open source. One-click deployment and autoscaling endpoints without provisioning your own infrastructure.
- Malwarekid python BadUSB payload encoder for generating powershell script in bas64☆22Nov 6, 2024Updated last year
- URL Fuzzer☆20Nov 22, 2024Updated last year
- Dark-Hydro es una herramienta de osint completa para un numero telefonico.☆36Apr 14, 2024Updated 2 years ago
- 🌈 Extremely straightforward evaluation-time Pywal integration for Home Manager☆13Feb 27, 2026Updated last month
- ☆23Mar 14, 2025Updated last year
- Cyber Security Notes☆16Dec 11, 2025Updated 4 months ago
- subExtreme is a subdomain discovery tool written in Rust, designed to perform brute-force attacks to discover subdomains.☆15Sep 17, 2025Updated 7 months ago
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆126Dec 17, 2024Updated last year
- Reverse Engineering 4 Fun & Profit☆25May 27, 2025Updated 10 months ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- ☆19Sep 9, 2025Updated 7 months ago
- CEH v13 i-labs , CEH v13 Engage Answers☆39Jul 5, 2025Updated 9 months ago
- Read a .TLScan file containing the PCIe Configuration Space and Generate a Write Mask☆11Sep 10, 2024Updated last year
- ReconX is a powerful and user-friendly reconnaissance tool designed for security researchers and penetration testers. It provides a compr…☆27Dec 24, 2024Updated last year
- A NixOS configuration flake with a focus on reusability across different hosts☆27Mar 19, 2026Updated last month
- recon for bug hunters☆879Mar 5, 2026Updated last month
- best chess analysis bot made for educational purposes only !!☆14Feb 11, 2025Updated last year
- Hex encode & decode a string, right from your terminal.☆10Jan 5, 2023Updated 3 years ago
- hardware dma counter-strike 2 cheat☆16Apr 19, 2024Updated 2 years ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Config files for OpenBullet☆12Nov 18, 2019Updated 6 years ago
- A tool to abuse weak permissions of Active Directory Discretionary Access Control Lists (DACLs) and Access Control Entries (ACEs)☆62Feb 4, 2026Updated 2 months ago
- Public Advisories for Security Vulnerabilities.☆25Mar 14, 2015Updated 11 years ago
- Build script and Dockerfile to produce the restic binaries☆35Mar 27, 2025Updated last year
- My OSWE Pre-preperation (i.e. before acutally buying the course) phase plan and notes!☆85Jul 22, 2025Updated 8 months ago
- Public Nullsecurity Website☆14Jan 2, 2026Updated 3 months ago
- Print age encrypted small secrets for offline recovery☆25Apr 3, 2026Updated 2 weeks ago