kbonato / Awesome-Pentest-Reports
Awesome Pentest Reports
☆14Updated last year
Alternatives and similar repositories for Awesome-Pentest-Reports:
Users that are interested in Awesome-Pentest-Reports are comparing it to the libraries listed below
- ☆49Updated 3 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆43Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆49Updated last year
- Tool for fetching all the available waybackmachine snapshot urls☆21Updated 5 months ago
- Aline dork Automator☆31Updated 3 years ago
- ☆43Updated 3 years ago
- Android Pentest Setup Environment☆30Updated 2 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆24Updated 4 months ago
- DNS resolution tracing tool☆34Updated 3 years ago
- Automated tool for domains & Subdomains Gathering☆13Updated last year
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆18Updated 5 months ago
- ThreatTrack | Shodan + ExploitDB + GitHub + NVD☆17Updated 8 months ago
- "🔍 Subtron: Bash-driven subdomain seeker. Utilizes Subfinder, Amass, Assetfinder, and HTTPX to swiftly uncover live domains. Results sto…☆22Updated last year
- ☆68Updated last year
- ☆16Updated 2 months ago
- Jumpstart multiple WebSocket servers quickly☆31Updated 3 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆11Updated 4 years ago
- pugrecon is a bash script for automatic recon of common vulnerabilities, misconfigurations and files on domains.☆23Updated 4 years ago
- Filter URLs to save your time.☆59Updated 2 years ago
- ☆29Updated 3 years ago
- ☆53Updated 2 years ago
- ☆13Updated last year
- Fuxsociety Mr Robot 2.1☆27Updated last year
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆47Updated 5 months ago
- Organizar documentos sobre OSINT feitos em pt-br☆18Updated last year
- ☆19Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- ☆12Updated 2 years ago