goyalvartul / Cloud-Security-Encyclopedia
☆11Updated last year
Related projects: ⓘ
- This repository is intended for sharing files/tools/tutorials..etc that related to eWPTXv2 from eLearnSecurity☆13Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Updated 2 years ago
- Virtual Security Operations Center☆49Updated last year
- ☆16Updated 2 years ago
- Atlassian Confluence CVE-2021-26084 one-liner mass checker☆30Updated 3 years ago
- ☆14Updated 3 years ago
- ☆14Updated last year
- HTTP requests of FrontPage expolit☆23Updated 10 years ago
- The aim of the project is to develop intentionally vulnerable source code in various languages.☆12Updated 4 years ago
- Appsecco training course content on Attacking and Auditing Dockers Containers and Kubernetes Clusters☆13Updated 4 years ago
- ☆11Updated 4 years ago
- ☆0Updated 4 years ago
- Buggyapp is an vulnerable android application. This app can be used by pentesters, security researchers to practice Android application p…☆12Updated 2 years ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆16Updated 2 years ago
- This is a repository for Penetration Test, Purple Team Exercise and Red Team☆17Updated 9 months ago
- ☆19Updated 3 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 2 years ago
- Manage attack surface data on Elasticsearch☆19Updated 10 months ago
- A not-curated list of cloud hacking labs☆19Updated 5 months ago
- A tools for JavaScript Recon☆20Updated 4 years ago
- Noob Penetration tester☆10Updated 4 months ago
- HazProne is a Cloud Pentesting Framework that emulates close to Real-World Scenarios by deploying Vulnerable-By-Demand AWS resources enab…☆39Updated 2 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆22Updated 3 years ago
- King of Bug Bounty Tips Simple Tool☆10Updated 2 years ago
- New Framework Red Team Operations☆17Updated 3 years ago
- Python script to launch burp scans automatically☆32Updated 3 years ago
- Easy discovery of assets☆11Updated 2 years ago
- ☆21Updated 3 years ago
- ☆13Updated 11 months ago
- Web application pentesting recon☆23Updated 4 years ago