Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
☆241Nov 4, 2020Updated 5 years ago
Alternatives and similar repositories for PENTESTING-BIBLE
Users that are interested in PENTESTING-BIBLE are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Script that download 37+ open source nuclei templates☆45Sep 2, 2022Updated 3 years ago
- This cheatsheet is built for the Bug Bounty Hunters and penetration testers in order to help them hunt the vulnerabilities from P4 to P1 …☆2,511Mar 14, 2026Updated last month
- ☆138Jul 9, 2021Updated 4 years ago
- Predicting the probability of an exploit being released after a CVE is published (by Machine learning algorithm)☆13Aug 8, 2023Updated 2 years ago
- Repository with some necessary information for you to create your PenTest consultancy☆102Jan 12, 2025Updated last year
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆6,603Jan 18, 2026Updated 3 months ago
- vusialization of geo points from photos from vk profile☆47Feb 16, 2022Updated 4 years ago
- OWASP practice lab, just a few copy/pastes away. Fully stacked and ready to go with Docker☆21Oct 13, 2018Updated 7 years ago
- Framework for Telegram users and chats investigating☆74Jun 5, 2025Updated 11 months ago
- RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.☆1,913Oct 29, 2025Updated 6 months ago
- Lupo - Malware IOC Extractor. Debugging module for Malware Analysis Automation☆102May 11, 2022Updated 4 years ago
- Presentation materials for my Black Hat USA 2022 Briefing and Arsenal talks☆64Aug 4, 2022Updated 3 years ago
- ☆443Oct 23, 2022Updated 3 years ago
- Code and result files (models, etc.) related to Metadata Digger's parts using Artificial Intelligence methods.☆12Feb 4, 2020Updated 6 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Collection of methodology and test case for various web vulnerabilities.☆7,105Jun 25, 2025Updated 10 months ago
- I do not own nor did I create these. I simply found publicly available cheat sheets and compiled a list for InfoSec students. This list c…☆89Apr 21, 2022Updated 4 years ago
- ☆53Apr 19, 2023Updated 3 years ago
- Extracts favicon of the current page and calculates their murmurhash. Firefox extension source code.☆18Feb 20, 2024Updated 2 years ago
- I collected it to help the bug hunter get a reward☆57Sep 7, 2022Updated 3 years ago
- Simple Google Dorks search tool☆330Sep 3, 2025Updated 8 months ago
- Mind-Maps of Several Things☆2,650Jun 29, 2023Updated 2 years ago
- ☆522Jun 5, 2023Updated 2 years ago
- Azure and AWS Attacks☆1,119Nov 25, 2022Updated 3 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting for WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Deploy in minutes on Cloudways by DigitalOcean.
- A list of threat sinks used in the manual security source code review for application security☆76May 9, 2023Updated 3 years ago
- ☆1,719Aug 19, 2022Updated 3 years ago
- Bug Bounty Roadmaps☆1,719Jun 12, 2021Updated 4 years ago
- OSWE, OSEP, OSED, OSEE☆3,817Jan 2, 2026Updated 4 months ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆2,733Jul 6, 2025Updated 10 months ago
- Cobalt Strike DNS beacon parser☆11Nov 29, 2021Updated 4 years ago
- Bringing infosec community, group and leaders together that solve community challenges, problems, create cultural and provide value to In…☆194Dec 5, 2022Updated 3 years ago
- Polymorphic code obfuscator for use in Red Team operations☆33Apr 13, 2022Updated 4 years ago
- Collection of resources that are made by the Malware Research community☆239Jun 17, 2023Updated 2 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- AppSec Payloads Arsenal for Pentration Tester and Bug Bounty Hunters☆928Apr 1, 2026Updated last month
- A collection of awesome API Security tools and resources. The focus goes to open-source tools and resources that benefit all the communit…☆3,789May 1, 2026Updated last week
- ☆535Jul 16, 2021Updated 4 years ago
- ☆905Mar 17, 2026Updated last month
- ☆1,011Jan 22, 2022Updated 4 years ago
- Microsoft Signed PowerShell scripts☆218Mar 14, 2023Updated 3 years ago
- Quick OSINT checks for IPs and Domains during triage and investigations.☆31Apr 14, 2026Updated 3 weeks ago