☆55Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for pwk-cheatsheet
Users that are interested in pwk-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of open source and commercial tools that aid in red team operations.☆50May 25, 2020Updated 5 years ago
- Combination of all my Resources, Links & Scripts☆298Aug 13, 2019Updated 6 years ago
- RepoToStoreBugBountyInfo☆391Mar 11, 2020Updated 6 years ago
- m0chan.github.io☆89Sep 16, 2025Updated 7 months ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- Virtual machines for every use case on DigitalOcean • AdGet dependable uptime with 99.99% SLA, simple security tools, and predictable monthly pricing with DigitalOcean's virtual machines, called Droplets.
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆19Oct 4, 2021Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- Wordpress hosting with auto-scaling - Free Trial • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Network Infrastructure Penetration Testing Tool☆10Jan 7, 2015Updated 11 years ago
- This is GitHub_Dorks and some tips i collect from different resources.Recon_Api is tip when you find token or api without knowing what to…☆21Sep 15, 2021Updated 4 years ago
- ☆39Nov 9, 2025Updated 5 months ago
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- PDF slides☆248Aug 19, 2021Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Passively check for XSS character encodings☆18Mar 9, 2026Updated last month
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- 0DayList☆15Apr 4, 2022Updated 4 years ago
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 5 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆111Jan 25, 2024Updated 2 years ago
- Xss payload for bypassing waf☆18Apr 18, 2020Updated 6 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- OSCP Methodology☆56Sep 6, 2023Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year