Pentesting, made easy.
☆149Mar 26, 2026Updated 2 weeks ago
Alternatives and similar repositories for kitsec-core
Users that are interested in kitsec-core are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The Hack3r News B'darija☆18Jan 1, 2023Updated 3 years ago
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- ☆14Jun 29, 2023Updated 2 years ago
- POC for CVE-2021-41091☆65May 20, 2023Updated 2 years ago
- WebDirScan is a tool for brute-forcing URIs (directories and files) on web servers by taking input directory to scan for files & director…☆11Mar 31, 2023Updated 3 years ago
- NordVPN Special Discount Offer • AdSave on top-rated NordVPN 1 or 2-year plans with secure browsing, privacy protection, and support for for all major platforms.
- ☆23Oct 21, 2024Updated last year
- Describe how to use ffuf different options with examples☆13Jun 13, 2022Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 3 years ago
- Automate Scoping, OSINT and Recon assessments.☆114Feb 3, 2026Updated 2 months ago
- ☆20Jul 7, 2024Updated last year
- Run ffuf with the appropriate options to brute-force the directories using the awesome different wordlists.☆25Apr 19, 2023Updated 2 years ago
- Cloudformation Template to Launch the SOC from Kali Purple☆54Dec 8, 2023Updated 2 years ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆36May 27, 2023Updated 2 years ago
- ☆12Aug 22, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- A really good cybersec reading materials.☆13Aug 13, 2022Updated 3 years ago
- ☆13Dec 21, 2023Updated 2 years ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- Github as C2 Demonstration , free API = free C2 Infrastructure☆148Aug 2, 2023Updated 2 years ago
- ResetRyder - Open Source Brute Force Password Reset Tool☆18Mar 10, 2025Updated last year
- BnademOverFlow's Official Website☆36Mar 6, 2023Updated 3 years ago
- offensive security scripts and documentation☆30Mar 9, 2026Updated last month
- Instant access to you bug bounty submission dashboard on various platforms + publicly disclosed reports + #bugbountytip☆26May 26, 2020Updated 5 years ago
- Windows priviledge escalation script☆13Feb 1, 2025Updated last year
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- <img src=x onerroralert(1);>☆11Jul 12, 2014Updated 11 years ago
- abusing Process Hacker driver to terminate other processes (BYOVD)☆83May 23, 2023Updated 2 years ago
- Cfd (Cloudflare detector) is a tool that allows you to check one or more domains to see if they are protected by CloudFlare or not. The c…☆17Mar 30, 2023Updated 3 years ago
- wp content injection mass exploit Perl Script☆12Jul 11, 2017Updated 8 years ago
- WebApp for BugBounty Hunters☆14Mar 24, 2017Updated 9 years ago
- Extracted data & informations from the Conti & TrickBot leaks.☆15Mar 12, 2022Updated 4 years ago
- Pull Hashes Decryption From Online Sources Using Python☆15Jun 25, 2024Updated last year
- This script identifies Host Header Injection vulnerabilities in a list of URLs or a specific domain, outputting the vulnerable locations …☆15May 23, 2023Updated 2 years ago
- This is automation tool which utilize 2 sub -domain finder and then sort out working sub-domain and finally scan for sub-doamin TAKEOVER.☆11May 6, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- FWT is a security analysis and file monitoring tool that utilizes Sysmon events.☆28Jul 15, 2024Updated last year
- A curated list wordlists for bruteforcing and fuzzing☆85Apr 3, 2023Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆87May 5, 2023Updated 2 years ago
- Scripts for bug bounty-ing and attack surface mapping☆13Jan 10, 2022Updated 4 years ago
- ☆19Jul 29, 2022Updated 3 years ago
- CTF writeups with challenge files (when available), details, and solutions☆60Jan 27, 2026Updated 2 months ago
- A ServiceWorker for client-side reconstruction of composite mementos☆16Mar 6, 2025Updated last year