kbonato / Awesome-Pentest-ReportsLinks
Awesome Pentest Reports
☆16Updated 2 years ago
Alternatives and similar repositories for Awesome-Pentest-Reports
Users that are interested in Awesome-Pentest-Reports are comparing it to the libraries listed below
Sorting:
- ☆56Updated 2 years ago
- ☆49Updated 3 years ago
- Rubidea - Bind XSS Server to Steal cookies.☆13Updated 5 years ago
- This is vulnerable microservice written in many language to demonstrating OWASP API Top Security Risk (under development)☆45Updated 2 years ago
- The purpose of this script is to automate the web enumeration process and search for exploits☆114Updated 3 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆25Updated 6 months ago
- Repositório criado com intuito de reunir templates da ferramenta Nuclei dentro do contexto Brasil☆80Updated 2 years ago
- ☆17Updated 9 months ago
- Create your own recon & vulnerability scanner with Trickest and GitHub☆48Updated 2 years ago
- Brazilian OSINT Sources☆28Updated last year
- ☆66Updated 2 years ago
- Find alive host from dumped subdomains, huge domain list , alive subdomains☆26Updated 4 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆46Updated last year
- ASNPepper - Recon in ASN - Extracting CIDR's - Fast and efficient scanning☆20Updated last year
- ☆28Updated last year
- The most powerfull Web Content Scanner☆122Updated 4 months ago
- HTTP parameter discovery suite.☆63Updated 5 years ago
- ☆56Updated 3 years ago
- BBT - Bug Bounty Tools☆56Updated 4 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆14Updated last year
- A powerful and sophisticated tool for detecting and exploiting open redirect vulnerabilities using the sed utility and a selected list of…☆48Updated last year
- ☆84Updated 2 years ago
- ☆28Updated 7 months ago
- Execute Trickest workflows right from your terminal☆93Updated last week
- IP Lookups for Open Ports and Vulnerabilities from internetdb.shodan.io☆132Updated 3 years ago
- Automated tool for domains & Subdomains Gathering☆14Updated last year
- Payloads for Web Application Security Testing☆14Updated 2 months ago
- Methodoloy for pentesting web applications.☆10Updated 3 years ago
- This program aims to check active targets by saving screenshots in a project.☆14Updated 4 months ago