jhaddix / deepdarkCTILinks
Collection of Cyber Threat Intelligence sources from the deep and dark web
☆10Updated 3 months ago
Alternatives and similar repositories for deepdarkCTI
Users that are interested in deepdarkCTI are comparing it to the libraries listed below
Sorting:
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆134Updated 6 months ago
- Some tips for Bug Bounty using LibreOffice☆46Updated 4 months ago
- A list of all Active Directory machines from HackTheBox☆60Updated 2 weeks ago
- Grep subdomains from web pages.☆42Updated 4 months ago
- A passive way to find backups/ sensitive information.☆82Updated last month
- Sliver CheatSheet for OSEP☆86Updated 3 weeks ago
- ☆58Updated last year
- Auto-Recon script that will help you in the Burp Suite Certified Practitioner Examor with any web-security lab.☆47Updated 11 months ago
- Vulnerabilities you my miss during a penetration testing.☆98Updated last year
- Apache HTTP Server Vulnerability Testing Tool | PoC for CVE-2024-38472 , CVE-2024-39573 , CVE-2024-38477 , CVE-2024-38476 , CVE-2024-3847…☆98Updated 8 months ago
- ☆134Updated 3 months ago
- Drupalwned is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's critical…☆40Updated last year
- ☆75Updated 2 months ago
- ☆59Updated 6 months ago
- Xploitra is a powerful reverse shell payload generator for educational and security testing. It offers customizable payloads with advance…☆63Updated 8 months ago
- Morgan is a powerful tool designed to help security researchers, developers, and security auditors identify sensitive information, vulner…☆54Updated 4 months ago
- SPIP before 4.2.1 allows Remote Code Execution via form values in the public area because serialization is mishandled. The fixed versions…☆64Updated 8 months ago
- ☆119Updated last year
- A Powerful Recon Engine☆65Updated 7 months ago
- ☆46Updated 3 months ago
- I-Espresso is a tool that enables users to generate Portable Executable (PE) files from batch scripts. Leveraging IExpress, it demonstrat…☆77Updated 8 months ago
- Frogy 2.0 is an automated external reconnaissance and Attack Surface Management (ASM) toolkit☆105Updated last month
- Bypass-Four03 is a powerful bash tool designed to help testers bypass HTTP 403 forbidden errors through various path and header manipulat…☆144Updated last month
- Unwaf is a Go tool designed to help identify WAF bypasses using passive techniques, such as: SPF records and DNS history. By default, Unw…☆91Updated 10 months ago
- ☆42Updated 8 months ago
- Scripts, files, cheatsheets and more used for pentesting and my OSWE / AWAE exam.☆87Updated this week
- Dnsbruter is a powerful tool designed to perform active subdomain enumeration and discovery. It uses DNS resolution to efficiently brutef…☆119Updated 6 months ago
- IDOR Forge is an advanced and versatile tool designed to detect Insecure Direct Object Reference (IDOR) vulnerabilities in web applicatio…☆139Updated last month
- LDAP Enumeration Tool for Pentesters☆47Updated 2 months ago
- Master Thick Client Penetration Testing: Explore practical methodologies, uncover vulnerabilities, and enhance security.☆11Updated last year