paralax / Awesome-Pentest-1
Awesome Penetration Testing A collection of awesome penetration testing resources
☆54Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for Awesome-Pentest-1
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 4 years ago
- ☆17Updated 3 years ago
- ☆36Updated this week
- A simple reconnaissance framework for bug bounty hunting☆35Updated 4 years ago
- Simple fork from degoogle original project with bug hunting purposes☆85Updated 2 years ago
- ☆51Updated 3 years ago
- ☆22Updated 3 years ago
- Pipe different tools with google dork Scanner☆56Updated 4 years ago
- Script for Reconnaissance(Bug Bounty)☆17Updated 2 years ago
- Journey to Try Harder !!!☆30Updated 5 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated last year
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Updated 3 years ago
- ☆45Updated 7 years ago
- A solid recon tool I use personally.☆30Updated last year
- Domain availbility checker☆38Updated 3 years ago
- ASN reconnaissance script☆23Updated 4 years ago
- Virtual host wordlist☆51Updated 3 years ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 2 years ago
- AWS S3 open bucket poc automated script.☆55Updated 3 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆50Updated 2 years ago
- XSS Finder Via SSTI☆54Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 4 years ago
- Here are some cool and some unpublished Dorks☆22Updated 6 months ago
- OSWE Preparation☆37Updated 5 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 2 years ago
- Tool to generate csrf payloads based on vulnerable requests☆61Updated 4 years ago
- ☆25Updated 10 months ago