hdks-bug / exploit-notes
Sticky notes for pentesting, bug bounty, CTF.
☆694Updated 3 weeks ago
Alternatives and similar repositories for exploit-notes
Users that are interested in exploit-notes are comparing it to the libraries listed below
Sorting:
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆789Updated last year
- Tips on how to write exploit scripts (faster!)☆488Updated 10 months ago
- A simple tool for bypassing file upload restrictions.☆848Updated 9 months ago
- ☆537Updated 11 months ago
- 1337 Wordlists for Bug Bounty Hunting☆828Updated 3 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆872Updated 2 years ago
- improving...☆176Updated 3 months ago
- Burp Suite Certified Practitioner Exam Study☆1,047Updated 2 months ago
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,140Updated 4 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆568Updated 7 months ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆539Updated last week
- linWinPwn is a bash script that streamlines the use of a number of Active Directory tools☆1,967Updated this week
- An IIS short filename enumeration tool☆929Updated 5 months ago
- ☆657Updated this week
- A RedTeam Toolkit☆397Updated last month
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,355Updated 3 weeks ago
- A Modern Framework for Bug Bounty Hunting☆584Updated 3 months ago
- ☆525Updated 10 months ago
- RedCloudOS is a Cloud Adversary Simulation Operating System for Red Teams to assess the Cloud Security of Leading Cloud Service Providers…☆636Updated 11 months ago
- A library for detecting known secrets across many web frameworks☆629Updated this week
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,393Updated 3 weeks ago
- My Notes about Penetration Testing☆667Updated 2 months ago
- Ultimate Burp Suite Exam and PortSwigger Labs Guide.☆265Updated 2 years ago
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,248Updated 3 weeks ago
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆867Updated last year
- Penelope Shell Handler☆929Updated 2 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆633Updated 2 years ago
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆835Updated last year
- Active Directory pentesting mind map☆415Updated last year
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆67Updated last year