n3k / PentestLinks
Notes/Tools for pentesting
☆78Updated 2 years ago
Alternatives and similar repositories for Pentest
Users that are interested in Pentest are comparing it to the libraries listed below
Sorting:
- Albatar is a SQLi exploitation framework in Python☆137Updated last year
- ☆96Updated 8 years ago
- Collection of OSCP study material && tools.☆78Updated 6 years ago
- This repository contains all the material from the talk "Practical recon techniques for bug hunters & pentesters" given at Bugcrowd Level…☆62Updated 7 years ago
- ☆121Updated 8 years ago
- Custom tools and projects about security☆110Updated 6 months ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆165Updated 6 years ago
- Scripts for Deploying new server☆49Updated 9 months ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 9 years ago
- Vulnerable OS Collection is a collection of four Ubuntu based OSes containing real world vulnerable web applications.☆58Updated 8 years ago
- ☆18Updated 8 years ago
- Files for appsecwiki.com☆120Updated 5 years ago
- A DB of known Web Application Admin URLS, Username/Password Combos and Exploits☆156Updated 10 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.☆77Updated 6 years ago
- Bodhi - Client-side Vulnerability Playground☆123Updated 4 years ago
- [A]ndroid [A]pplication [P]entest [G]uide☆123Updated 6 years ago
- Just a collection of pentest stuffs☆94Updated 5 years ago
- useful pentest note☆68Updated 2 months ago
- Penetration Testing Playbook (PTP)☆176Updated 7 years ago
- Miscellaneous pentesting scripts for OSCP☆59Updated 7 years ago
- The Attack Surface Detector uses static code analyses to identify web app endpoints by parsing routes and identifying parameters☆110Updated 2 years ago
- Handbook and survival guide for hacking over the wire, OSCP-style☆44Updated 5 years ago
- Notes as I learn basic AWS penetration testing☆67Updated 6 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Updated 7 years ago
- VPN pentest tools and scripts☆126Updated 8 years ago
- Burp Suite Importer - Connect to multiple web servers while populating the sitemap.☆47Updated 5 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag event☆97Updated 7 years ago
- Database of websites for penetration testing☆180Updated 6 years ago
- Basics of Windows privilege escalation☆134Updated 8 years ago