hdks-bug / exploit-notesLinks
Sticky notes for pentesting, bug bounty, CTF.
☆703Updated 2 months ago
Alternatives and similar repositories for exploit-notes
Users that are interested in exploit-notes are comparing it to the libraries listed below
Sorting:
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆799Updated last year
- A simple tool for bypassing file upload restrictions.☆863Updated 11 months ago
- improving...☆188Updated this week
- 1337 Wordlists for Bug Bounty Hunting☆836Updated 4 months ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆551Updated 3 weeks ago
- ☆670Updated this week
- Penelope Shell Handler☆950Updated 2 weeks ago
- An XSS exploitation command-line interface and payload generator.☆1,381Updated 5 months ago
- Tips on how to write exploit scripts (faster!)☆497Updated 11 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆877Updated 2 years ago
- A RedTeam Toolkit☆400Updated 2 months ago
- Burp Suite Certified Practitioner Exam Study☆1,071Updated 3 weeks ago
- ☆545Updated last year
- Fast and customizable subdomain wordlist generator using DSL☆822Updated 2 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,419Updated last month
- PDF Files for Pentesting☆602Updated 8 months ago
- Active Directory pentesting mind map☆428Updated 2 years ago
- An IIS short filename enumeration tool☆960Updated 7 months ago
- Real-world infosec wordlists, updated regularly☆1,526Updated this week
- The EXCLUSIVE Collection of 50,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.☆1,067Updated this week
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,119Updated 2 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆637Updated last year
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆571Updated 8 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,206Updated 5 months ago
- Hardware/IOT Pentesting Wiki☆649Updated last month
- ☆616Updated 10 months ago
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆2,002Updated last week
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆71Updated last year
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆536Updated last year
- Automatic SSTI detection tool with interactive interface☆1,096Updated 2 months ago