gwen001 / pentest-toolsLinks
A collection of custom security tools for quick needs.
☆3,228Updated 2 years ago
Alternatives and similar repositories for pentest-tools
Users that are interested in pentest-tools are comparing it to the libraries listed below
Sorting:
- A Workflow Engine for Offensive Security☆5,841Updated 2 weeks ago
- A curated list of amazingly awesome Burp Extensions☆3,262Updated 6 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,277Updated 10 months ago
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,231Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,244Updated 3 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,309Updated 6 months ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆3,954Updated last year
- This repo contains hourly-updated data dumps of bug bounty platform scopes (like Hackerone/Bugcrowd/Intigriti/etc) that are eligible for …☆3,436Updated this week
- gitGraber: monitor GitHub to search and find sensitive data in real time for different online services such as: Google, Amazon, Paypal, G…☆2,182Updated 2 months ago
- This script is intended to automate your reconnaissance process in an organized fashion☆1,993Updated 4 years ago
- A collection of tiny XSS Payloads that can be used in different contexts. https://tinyxss.terjanq.me☆2,172Updated 8 months ago
- A collection of awesome one-liner scripts especially for bug bounty tips.☆2,918Updated last year
- Our main goal is to share tips from some well-known bughunters. Using recon methodology, we are able to find subdomains, apis, and tokens…☆4,669Updated 7 months ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,659Updated 3 years ago
- A collection of hacks and one-off scripts☆2,341Updated 5 months ago
- BBT - Bug Bounty Tools (examples💡)☆1,827Updated last year
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,466Updated 2 years ago
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,835Updated 3 years ago
- Keyhacks is a repository which shows quick ways in which API keys leaked by a bug bounty program can be checked to see if they're valid.☆5,667Updated last year
- Awesome XSS stuff☆4,955Updated 9 months ago
- This challenge is Inon Shkedy's 31 days API Security Tips.☆2,146Updated 3 years ago
- For basic researches, top 25 vulnerability parameters that can be used in automation tools or manual recon. 🛡️⚔️🧙☆1,778Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆5,260Updated 2 years ago
- ⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting☆4,137Updated 2 months ago
- Collection of methodology and test case for various web vulnerabilities.☆6,574Updated last month
- A python script that finds endpoints in JavaScript files☆4,083Updated last year
- ☆2,281Updated last year
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,429Updated last year
- HTTP parameter discovery suite.☆5,811Updated 6 months ago
- ☆1,762Updated 2 months ago