h4md153v63n / eLearnSecurity-Web-Application-Penetration-Tester-eXtreme-eWPTXv2View external linksLinks
eLearnSecurity Web application Penetration Tester eXtreme (eWPTXv2)
☆28Feb 6, 2024Updated 2 years ago
Alternatives and similar repositories for eLearnSecurity-Web-Application-Penetration-Tester-eXtreme-eWPTXv2
Users that are interested in eLearnSecurity-Web-Application-Penetration-Tester-eXtreme-eWPTXv2 are comparing it to the libraries listed below
Sorting:
- Backdoor, keylogger, mac changer, mitm, netscan, sniffer☆15Aug 15, 2024Updated last year
- API research and learning☆12May 22, 2019Updated 6 years ago
- Learn AWS Security by Example☆22Apr 20, 2022Updated 3 years ago
- Notes on Preparing for Offsec☆27Jul 24, 2023Updated 2 years ago
- OAuth 2.0 Dynamic Security Scanner☆33Feb 27, 2021Updated 4 years ago
- ☆10Jun 16, 2021Updated 4 years ago
- Bashful argument parsing☆13May 13, 2020Updated 5 years ago
- Some notes written during my OSCP Journey (KeepNote project)☆10Mar 2, 2020Updated 5 years ago
- ☆13Jan 17, 2025Updated last year
- Convert asciinema JSON files to GIF for embedding in Github, Medium, email, Slack and more!☆11Sep 24, 2020Updated 5 years ago
- ReconX is a powerful automated reconnaissance and vulnerability scanning tool designed for ethical hackers, penetration testers, and secu…☆15Feb 27, 2025Updated 11 months ago
- OWASP Coimbatore's Web & Project Repository☆13Jan 23, 2026Updated 3 weeks ago
- ☆11Sep 6, 2023Updated 2 years ago
- A cheatsheet and mindmap for CRTO certification☆14Mar 22, 2023Updated 2 years ago
- ☆44Apr 27, 2024Updated last year
- Cheat sheet☆36Dec 16, 2019Updated 6 years ago
- helper encrypt data☆10Jun 2, 2021Updated 4 years ago
- Source code related of the articles posted in medium.com☆12Nov 2, 2020Updated 5 years ago
- A fast python tool for creating permutations of alphanumerics☆11Mar 22, 2020Updated 5 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Jan 7, 2025Updated last year
- My lab notes and learning progress for the PortSwigger Web Security Academy's SQL Injection chapter.☆12Aug 10, 2023Updated 2 years ago
- uitvim :P (IDE)☆29Updated this week
- TechTalk: Procesamiento masivo de datos con Go y sync.Pool☆12Jan 28, 2022Updated 4 years ago
- A VS Code Extension to import USB Rubber Ducky keystroke injection payloads quickly!☆14Aug 29, 2023Updated 2 years ago
- My blog☆10Oct 6, 2025Updated 4 months ago
- AWS container security survey 2020☆11Dec 2, 2020Updated 5 years ago
- Tools and Scripts used in CRTP☆12Apr 27, 2020Updated 5 years ago
- Simple script for testing CVE-2016-2402 and similar flaws☆13Mar 30, 2016Updated 9 years ago
- This Log4j RCE exploit originated from https://github.com/tangxiaofeng7/CVE-2021-44228-Apache-Log4j-Rce☆10Dec 16, 2021Updated 4 years ago
- Collection of resources for responding to the Log4j set of vulnerabilities.☆11Feb 22, 2022Updated 3 years ago
- Advanced shellcode injector for images supports BMP, GIF, EXIF (JPEG), and LSB (PNG) techniques. Includes XOR encoding, offset indexing, …☆25Jun 11, 2025Updated 8 months ago
- this is a simple shell that has the ability to bypass defenses☆13May 24, 2024Updated last year
- ☆11Jan 24, 2023Updated 3 years ago
- This repository contains fully disclosed accepted reports for the null Ahmedabad's Bug Bounty CTF.☆10Oct 31, 2023Updated 2 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- PoC for CVE-2025-48384☆20Jul 9, 2025Updated 7 months ago
- 🐚ᴠʟᴀɴɢ ʀᴇᴠᴇʀsᴇ sʜᴇʟʟ🐚☆11Apr 28, 2022Updated 3 years ago
- ☆11Dec 17, 2018Updated 7 years ago
- Chef library cookbook for managing AWS Security Groups☆11Sep 7, 2016Updated 9 years ago