j3ssie / the-book-of-secret-knowledgeLinks
A collection of awesome lists, manuals, blogs, hacks, one-liners, cli/web tools and more. Especially for System and Network Administrators, DevOps, Pentesters or Security Researchers.
☆66Updated 3 years ago
Alternatives and similar repositories for the-book-of-secret-knowledge
Users that are interested in the-book-of-secret-knowledge are comparing it to the libraries listed below
Sorting:
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆76Updated 6 years ago
- Portable and flexible web application security assessment tool.It parses Burp Suite log and performs various tests depending on the modul…☆36Updated 10 years ago
- Enumerate a target Based off of Nmap Results☆76Updated 2 years ago
- A deep look at some recon methodologies and web-application vulnerabilities of my interest where I will merge all my notes gathered from …☆109Updated 3 years ago
- Auto deployment of my VPS☆102Updated 4 years ago
- Offensive Security / Pentesting Cheat Sheets☆103Updated 7 years ago
- The project contains multiple shell scripts for automating the tasks during recon.☆174Updated 2 years ago
- Tool for exploiting SQL injection vulnerabilities that sqlmap can't find.☆96Updated 7 years ago
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Updated 6 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Updated 2 years ago
- Web Application recon automation☆126Updated 5 years ago
- Handy bash and python scripts for bug bounty hunting!☆47Updated 4 years ago
- Repo of useful scripts☆105Updated 5 years ago
- A collection of tools I wrote for bug bounty or hacking and don't mind publishing it☆120Updated last year
- This repo is for the Ruby version of EyeWitness☆28Updated 11 years ago
- Quiver is the tool to manage all of your tools for bug bounty hunting and penetration testing.☆214Updated 5 years ago
- Penetration Testing/Security Cheatsheets☆63Updated 10 years ago
- A powerful admin login page finder in python☆79Updated 7 years ago
- Bug Bounty Dork☆73Updated 3 years ago
- ☆72Updated 5 years ago
- use at your own risk☆37Updated 6 years ago
- Dorks for Google, Shodan and BinaryEdge☆144Updated 5 years ago
- Penetration Testing, Vulnerability Assessment and Red Team Learning☆134Updated last month
- ☆61Updated 4 years ago
- Amazingly fast response crawler to find juicy stuff in the source code! 😎🔥☆156Updated 2 years ago
- CPH:SEC WAES: Web Auto Enum & Scanner - Auto enums website(s) and dumps files as result☆69Updated this week
- Notes/Tools for pentesting☆79Updated 2 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated 2 years ago
- A Storehouse of resources related to Bug Bounty Hunting collected from different sources. Latest guides, tools, methodology, platforms ti…☆94Updated 4 years ago
- Search engine scraper tool with BASH script.☆83Updated 5 years ago