hdks-bug / exploit-notesLinks
Sticky notes for pentesting, bug bounty, CTF.
☆775Updated 6 months ago
Alternatives and similar repositories for exploit-notes
Users that are interested in exploit-notes are comparing it to the libraries listed below
Sorting:
- A simple tool for bypassing file upload restrictions.☆890Updated last year
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆891Updated 4 months ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆596Updated 4 months ago
- Tips on how to write exploit scripts (faster!)☆543Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,414Updated last year
- 1337 Wordlists for Bug Bounty Hunting☆926Updated this week
- Burp Suite Certified Practitioner Exam Study☆1,303Updated 2 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆886Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,630Updated this week
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆731Updated last year
- Simple and accurate guide for linux privilege escalation tactics☆277Updated 2 years ago
- bypass-url-parser☆1,110Updated last week
- improving...☆252Updated 3 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆1,285Updated 5 months ago
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆754Updated 2 years ago
- ⡷⠂𝚔𝚊𝚛𝚖𝚊 𝚟𝟸⠐⢾ is a Passive Open Source Intelligence (OSINT) Automated Reconnaissance (framework)☆931Updated 8 months ago
- ☆725Updated last week
- PDF Files for Pentesting☆692Updated last year
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆626Updated last week
- ☆702Updated last year
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆882Updated last month
- ☆582Updated 5 months ago
- ☆625Updated last month
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆609Updated 6 months ago
- A library for detecting known secrets across many web frameworks☆764Updated last week
- 🚫 Advanced tool for security researchers to bypass 403/40X restrictions through smart techniques and adaptive request manipulation. Fast…☆1,481Updated 7 months ago
- ☆544Updated last year
- An IIS short filename enumeration tool☆1,099Updated last year
- A RedTeam Toolkit☆409Updated 5 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,495Updated 2 months ago