nixawk / pentest-wikiLinks
PENTEST-WIKI is a free online security knowledge library for pentesters / researchers. If you have a good idea, please share it with others.
☆3,602Updated last year
Alternatives and similar repositories for pentest-wiki
Users that are interested in pentest-wiki are comparing it to the libraries listed below
Sorting:
- List of Awesome Red Teaming Resources☆7,306Updated last year
- Collection of the cheat sheets useful for pentesting☆4,063Updated last year
- Git All the Payloads! A collection of web attack payloads.☆3,797Updated 2 years ago
- Wiki to collect Red Team infrastructure hardening resources☆4,296Updated last year
- Custom bash scripts used to automate various penetration testing tasks including recon, scanning, enumeration, and malicious payload cre…☆3,667Updated last week
- This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.☆9,606Updated last month
- A list of interesting payloads, tips and tricks for bug bounty hunters.☆6,168Updated last year
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆3,914Updated 10 months ago
- Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet☆5,134Updated 6 months ago
- Official Black Hat Arsenal Security Tools Repository☆4,082Updated 10 months ago
- An Information Security Reference That Doesn't Suck; https://rmusser.net/git/admin-2/Infosec_Reference for non-MS Git hosted version.☆5,763Updated last year
- A collection of Burpsuite Intruder payloads, BurpBounty payloads, fuzz lists, malicious file uploads and web pentesting methodologies and…☆3,815Updated 3 years ago
- A curated list of amazingly awesome Burp Extensions☆3,212Updated 4 months ago
- Automated All-in-One OS Command Injection Exploitation Tool.☆5,312Updated this week
- The Bug Hunters Methodology☆4,094Updated last year
- A curated list of resources (books, tutorials, courses, tools and vulnerable applications) for learning about Exploit Development☆1,987Updated 3 years ago
- ✍️ A curated list of CVE PoCs.☆3,412Updated 3 years ago
- EyeWitness is designed to take screenshots of websites, provide some server header info, and identify default credentials if possible.☆5,338Updated 8 months ago
- A Tool for Domain Flyovers☆5,783Updated 3 years ago
- offsec batteries included☆1,564Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,568Updated 10 months ago
- A swiss army knife for pentesting networks☆8,781Updated last year
- Red Teaming Tactics and Techniques☆4,296Updated 10 months ago
- This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.☆3,437Updated 2 years ago
- The Penetration Testers Framework (PTF) is a way for modular support for up-to-date tools.☆5,333Updated 9 months ago
- A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.☆4,958Updated last year
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,161Updated 2 years ago
- A collected list of awesome security talks☆4,119Updated 4 years ago
- Penetration tests guide based on OWASP including test cases, resources and examples.☆2,633Updated 3 years ago
- Scripted Local Linux Enumeration & Privilege Escalation Checks☆7,411Updated last year