hideckies / exploit-notes
Sticky notes for pentesting, bug bounty, CTF.
☆658Updated this week
Alternatives and similar repositories for exploit-notes:
Users that are interested in exploit-notes are comparing it to the libraries listed below
- A simple tool for bypassing file upload restrictions.☆818Updated 7 months ago
- 1337 Wordlists for Bug Bounty Hunting☆812Updated last month
- Offensive Security OSCP, OSWP, OSEP, OSWA, OSWE, OSED, OSMR, OSEE, OSDA Exam and Lab Reporting / Note-Taking Tool☆764Updated 10 months ago
- Burp Suite Certified Practitioner Exam Study☆993Updated last week
- ☆526Updated 9 months ago
- A collection of CTF write-ups, pentesting topics, guides and notes. Notes compiled from multiple sources and my own lab research. Topics …☆524Updated last month
- ☆626Updated this week
- A Burp Suite extension to add OpenAI (GPT) on Burp and help you with your Bug Bounty recon to discover endpoints, params, URLs, subdomain…☆845Updated last year
- Real-world infosec wordlists, updated regularly☆1,451Updated this week
- Tool for discovering the origin host behind a reverse proxy. Useful for bypassing cloud WAFs!☆859Updated last year
- Burp Plugin to Bypass WAFs through the insertion of Junk Data☆1,026Updated last month
- An extremely effective subdomain enumeration wordlist of 3,000,000 lines, crafted by harvesting SSL certs from the entire IPv4 space.☆590Updated last year
- Tips on how to write exploit scripts (faster!)☆459Updated 7 months ago
- Automatic privilege escalation for misconfigured capabilities, sudo and suid binaries using GTFOBins.☆564Updated 3 months ago
- Pentesting cheatsheet with all the commands I learned during my learning journey. Will try to to keep it up-to-date.☆1,344Updated last week
- bypass-url-parser☆1,056Updated last week
- AllForOne allows bug bounty hunters and security researchers to collect all Nuclei YAML templates from various public repositories,☆577Updated 11 months ago
- ☆417Updated last month
- This cheat sheet outlines common enumeration and attack methods for Windows Active Directory using PowerShell.☆550Updated 4 months ago
- The EXCLUSIVE Collection of 50,000+ Nuclei templates based on Wordfence intel. Daily updates for bulletproof WordPress security.☆980Updated this week
- A RedTeam Toolkit☆395Updated 4 months ago
- Tool to bypass 403/40X response codes.☆1,180Updated 2 months ago
- REcollapse is a helper tool for black-box regex fuzzing to bypass validations and discover normalizations in web applications☆977Updated last year
- Automatic SSTI detection tool with interactive interface☆988Updated 4 months ago
- An IIS short filename enumeration tool☆876Updated 3 months ago
- ☆543Updated 8 months ago
- Community curated list of nuclei templates for finding "unknown" security vulnerabilities.☆57Updated 10 months ago
- ☆517Updated 8 months ago
- Burp Extension to find potential endpoints, parameters, and generate a custom target wordlist☆1,308Updated this week
- An XSS exploitation command-line interface and payload generator.☆1,308Updated last month