hackedbyagirl / OSCPLinks
OSCP Preperation
☆14Updated 4 years ago
Alternatives and similar repositories for OSCP
Users that are interested in OSCP are comparing it to the libraries listed below
Sorting:
- Script for Bug Bounty☆29Updated 4 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆59Updated 3 years ago
- ☆14Updated 2 years ago
- A docker image which will enumerate, sort, unique and resolve the results of various subdomains enumeration tools.☆71Updated last year
- Some contributions in the nuclei-templates repository☆58Updated 3 years ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 5 years ago
- Template used for my OSCP exam.☆30Updated 3 years ago
- HTTP verb tampering & methods enumeration☆62Updated 2 months ago
- DNS resolution tracing tool☆34Updated 4 years ago
- List all public repositories for (valid) GitHub usernames☆76Updated 2 years ago
- security.txt collection of most popular world-wide domains☆54Updated 2 years ago
- ☆57Updated last year
- Simple bash Oneliners to make life easier☆62Updated 4 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 3 years ago
- Tools, Resources & Helpful Tips☆14Updated 3 years ago
- Discovery Header Bug Bounty to DoD☆48Updated 4 years ago
- An SSRF detector tool written in golang. I have fixed some errors and added some more payloads to it. But the tool credits go to z0idsec.☆45Updated 4 years ago
- ☆56Updated 3 years ago
- Web CTF CheatSheet 🐈☆34Updated 6 years ago
- Nuclei Templates Directory☆54Updated 3 weeks ago
- Enhanced 403 bypass header☆21Updated 3 years ago
- Bugbounty utility to store list of enumerated subdomains into an sqlite3 db [one liner style / Pipe and save]☆29Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated 5 months ago
- ☆51Updated 8 years ago
- 📚 An ultimate collection wordlists of the best-known CMS☆91Updated last year
- Feed it a list of subdomains, it will resolve them and tell you which ones are internal☆93Updated 3 years ago
- bug bounty automation☆13Updated 4 years ago
- ☆48Updated 4 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated this week