hdks-bug / exploit-notesLinks
Sticky notes for pentesting, bug bounty, CTF.
☆726Updated last month
Alternatives and similar repositories for exploit-notes
Users that are interested in exploit-notes are comparing it to the libraries listed below
Sorting:
- A simple tool for bypassing file upload restrictions.☆878Updated last year
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆824Updated last year
- Tips on how to write exploit scripts (faster!)☆514Updated last year
- PDF Files for Pentesting☆633Updated 11 months ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆563Updated 2 months ago
- Burp Suite Certified Practitioner Exam Study☆1,166Updated last month
- improving...☆225Updated last month
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆708Updated last year
- ☆694Updated this week
- An XSS exploitation command-line interface and payload generator.☆1,391Updated 8 months ago
- 1337 Wordlists for Bug Bounty Hunting☆846Updated 2 weeks ago
- ☆564Updated last month
- Real-world infosec wordlists, updated regularly☆1,561Updated last week
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆880Updated 2 years ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆686Updated 2 years ago
- ☆675Updated last year
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆623Updated 10 months ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆890Updated 3 months ago
- ☆498Updated last week
- A library for detecting known secrets across many web frameworks☆700Updated this week
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆869Updated last year
- A RedTeam Toolkit☆407Updated last month
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,335Updated 2 months ago
- ☆539Updated last year
- Simple and accurate guide for linux privilege escalation tactics☆242Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆537Updated last year
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆657Updated last year
- An IIS short filename enumeration tool☆999Updated 9 months ago
- A OWASP Based Checklist With 500+ Test Cases☆789Updated 2 years ago
- bypass-url-parser☆1,088Updated last week