☆55Aug 22, 2017Updated 8 years ago
Alternatives and similar repositories for pwk-cheatsheet
Users that are interested in pwk-cheatsheet are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A collection of open source and commercial tools that aid in red team operations.☆52May 25, 2020Updated 5 years ago
- Combination of all my Resources, Links & Scripts☆299Aug 13, 2019Updated 6 years ago
- RepoToStoreBugBountyInfo☆397Mar 11, 2020Updated 6 years ago
- m0chan.github.io☆89Sep 16, 2025Updated 7 months ago
- Bug Hunting Handbook☆11Aug 11, 2022Updated 3 years ago
- Open source password manager - Proton Pass • AdSecurely store, share, and autofill your credentials with Proton Pass, the end-to-end encrypted password manager trusted by millions.
- Multithreaded Host Header Redirection Scanner☆14Nov 10, 2020Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Stock Management System v1.0 al…☆21Mar 30, 2021Updated 5 years ago
- burp插件开发笔记☆11Dec 26, 2021Updated 4 years ago
- A support web page for my eJPT / eCPPT Certification Process☆16Jan 18, 2018Updated 8 years ago
- Subdomain Recon Tool☆13Sep 11, 2022Updated 3 years ago
- ☆18Oct 4, 2021Updated 4 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- bug bounty☆11Aug 13, 2023Updated 2 years ago
- Subcert is a subdomain enumeration tool, that finds all the subdomains from certificate transparency logs.☆80Jun 28, 2021Updated 4 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆38Dec 12, 2023Updated 2 years ago
- This is GitHub_Dorks and some tips i collect from different resources.Recon_Api is tip when you find token or api without knowing what to…☆21Sep 15, 2021Updated 4 years ago
- Powershell-based Windows Security Auditing Toolbox☆10Aug 28, 2017Updated 8 years ago
- ☆37Updated this week
- go调用最大cpu内核数实现批量ip列表tcp端口快速扫描☆15Mar 20, 2020Updated 6 years ago
- ☆46Oct 7, 2021Updated 4 years ago
- An Vulnerability detection and Exploitation tool for CVE-2024-24919☆25Jun 5, 2024Updated last year
- Tips For Bug Bounty Hunters☆86Jul 16, 2022Updated 3 years ago
- A curated list of awesome infosec resources.☆32May 31, 2015Updated 10 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.☆30Jan 7, 2022Updated 4 years ago
- PDF slides☆247Aug 19, 2021Updated 4 years ago
- My nots from Web application Hacker's Handbook☆18Nov 22, 2021Updated 4 years ago
- New version of RottenPotato as a C++ DLL and standalone C++ binary - no need for meterpreter or other tools.☆36Dec 29, 2017Updated 8 years ago
- Passively check for XSS character encodings☆19Mar 9, 2026Updated 2 months ago
- Windows stuff☆16Feb 5, 2020Updated 6 years ago
- A PowerShell Module Dedicated to Reverse Engineering☆15Jan 17, 2020Updated 6 years ago
- Pentest Checklists☆21Aug 23, 2020Updated 5 years ago
- Repository contains an online education portal filled with web vulnerabilities.☆21Jan 3, 2020Updated 6 years ago
- Bare Metal GPUs on DigitalOcean Gradient AI • AdPurpose-built for serious AI teams training foundational models, running large-scale inference, and pushing the boundaries of what's possible.
- 0DayList☆15Apr 4, 2022Updated 4 years ago
- Top disclosed reports from HackerOne☆10Apr 15, 2021Updated 5 years ago
- Some Pentesters, Security Researchers, Red Teamers which i learned from them a lot...☆114Jan 25, 2024Updated 2 years ago
- Extract metadata with SSRF (Server-Side Request Forgery)☆16Jul 23, 2022Updated 3 years ago
- Get 10k subdomains in securitytrails using cookie without apikey.☆40Oct 23, 2025Updated 6 months ago
- OSCP Methodology☆56Sep 6, 2023Updated 2 years ago
- CONTROL C2 is a command and control framework designed for red teamers and penetration testers.☆15Oct 16, 2024Updated last year