hdks-bug / exploit-notesLinks
Sticky notes for pentesting, bug bounty, CTF.
☆748Updated 3 months ago
Alternatives and similar repositories for exploit-notes
Users that are interested in exploit-notes are comparing it to the libraries listed below
Sorting:
- Offensive Security OSCP+, OSEP, OSWP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA, OSIR, OSTH Exam and Lab Reporting / Note-Taking Tool☆845Updated last month
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆582Updated last month
- A simple tool for bypassing file upload restrictions.☆884Updated last year
- ☆706Updated this week
- improving...☆229Updated last month
- Burp Suite Certified Practitioner Exam Study☆1,229Updated this week
- Tips on how to write exploit scripts (faster!)☆525Updated last year
- An XSS exploitation command-line interface and payload generator.☆1,399Updated 10 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆627Updated last week
- 1337 Wordlists for Bug Bounty Hunting☆907Updated 2 months ago
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆725Updated last year
- Simple and accurate guide for linux privilege escalation tactics☆260Updated last year
- ☆690Updated last year
- PDF Files for Pentesting☆665Updated last year
- List of Awesome Red Team / Red Teaming Resources This list is for anyone wishing to learn about Red Teaming but do not have a starting p…☆710Updated 10 months ago
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆884Updated 2 years ago
- Active Directory pentesting mind map☆491Updated 2 years ago
- Penelope Shell Handler☆1,249Updated this week
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆721Updated 2 years ago
- ☆622Updated last month
- Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. …☆870Updated last year
- Red team Interview Questions☆714Updated 7 months ago
- ☆576Updated 3 months ago
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆596Updated 3 months ago
- A RedTeam Toolkit☆409Updated 3 months ago
- Dome - Subdomain Enumeration Tool. Fast and reliable python script that makes active and/or passive scan to obtain subdomains and search …☆539Updated last year
- ChatGPT Prompts for Bug Bounty & Pentesting☆672Updated 2 years ago
- Real-world infosec wordlists, updated regularly☆1,591Updated this week
- This is a collection of some of mine mindmaps abount pentesting created with Obsidian.☆432Updated 10 months ago
- My WriteUps for HackTheBox CTFs, Machines, and Sherlocks.☆148Updated this week