j3ssie / the-book-of-secret-knowledgeView external linksLinks
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆66Jun 13, 2022Updated 3 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- This guide details the planning and the tools involved in creating a secure Linux production systems - work in progress.☆19Feb 1, 2019Updated 7 years ago
- A full-fledged msfrpc library for Metasploit framework.☆13Aug 5, 2017Updated 8 years ago
- Training for Golang (go language)☆10Mar 29, 2019Updated 6 years ago
- How to Get Started into Bug Bounty Complete Beginner Guide ( Part 1 Web Pentesting ) Hello guys, after a lot of requests and questions o…☆11May 30, 2021Updated 4 years ago
- 10 Reset Password Flaws Based on Web Application Security☆11Oct 19, 2020Updated 5 years ago
- GetSimple CMS Custom JS Plugin Exploit RCE Chain☆11Mar 8, 2023Updated 2 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Jan 4, 2023Updated 3 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Recursive Credit Card Searcher For Windows C++ and Linux☆13Jan 10, 2020Updated 6 years ago
- Collection of auxiliary command line tools☆83Sep 23, 2023Updated 2 years ago
- Burp Suite Extensions☆12Oct 19, 2021Updated 4 years ago
- ☆12Jan 4, 2022Updated 4 years ago
- jaVasCript:/*-/*`/*\`/*'/*"/**/(/* */oNcliCk=alert() )//%0D%0A%0d%0a//</stYle/</titLe/</teXtarEa/</scRipt/--!>\x3csVg/<sVg/oNloAd=alert()…☆11Apr 9, 2021Updated 4 years ago
- Extract domain from SSL Information☆15Nov 23, 2021Updated 4 years ago
- A repository for business startups to grow their customers and marketing☆17Feb 4, 2025Updated last year
- TProx is a fast reverse proxy path traversal detector and directory bruteforcer.☆30Sep 16, 2021Updated 4 years ago
- List of Github repositories and articles with list of dorks for different search engines☆32May 15, 2022Updated 3 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 7 months ago
- Turns a list of URLs into hostnames.☆16Feb 9, 2026Updated last week
- eXtremely fast data eXtraction via blind SQL injection☆14Aug 15, 2012Updated 13 years ago
- My journey and notes on learning Offensive Security from the ground up☆21Dec 22, 2025Updated last month
- Convert Windows Netmon Monitor Mode Wireless Packet Captures to Libpcap Format☆15Jul 20, 2019Updated 6 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- 网上收集的一些利用工具☆18May 23, 2023Updated 2 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Get new vulnerability alerts daily straight to your slack channel using GitHub Actions.☆16Jan 15, 2026Updated last month
- XSS Payload without Anything.☆104Jun 28, 2019Updated 6 years ago
- Nuclei Templates☆14Jan 13, 2023Updated 3 years ago
- Resources for increasing power of ath9k devices, such as TP-link WN722N☆17Jun 5, 2015Updated 10 years ago
- Convert Nmap output for integration with other Project Discovery tools☆15Apr 2, 2023Updated 2 years ago
- Programs I Made while learning python for pentesters.☆20Aug 26, 2022Updated 3 years ago
- Scripts and misc. stuff related to the PortSwigger Web Academy☆17Feb 6, 2022Updated 4 years ago
- ☆43Aug 5, 2022Updated 3 years ago
- CloudHound is a cloudflare bypass tool which is using several methods such as DNS history Checkup, Cross-Site port Attack and etc to dete…☆21Apr 19, 2023Updated 2 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆42Mar 14, 2017Updated 8 years ago
- Generate a histogram of TCP and UDP payload bytes from a pcap file☆24Aug 1, 2022Updated 3 years ago
- An automated e-mail OSINT tool☆23Apr 23, 2022Updated 3 years ago
- ☆20May 25, 2025Updated 8 months ago