paralax / Awesome-Pentest-1Links
Awesome Penetration Testing A collection of awesome penetration testing resources
☆59Updated 7 years ago
Alternatives and similar repositories for Awesome-Pentest-1
Users that are interested in Awesome-Pentest-1 are comparing it to the libraries listed below
Sorting:
- Security pentesting/devsecops/bug bounty/Cloud etc.☆20Updated last year
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆59Updated 2 years ago
- ☆17Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 5 years ago
- Simple fork from degoogle original project with bug hunting purposes☆89Updated 2 years ago
- ASN reconnaissance script☆25Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Pipe different tools with google dork Scanner☆56Updated 4 years ago
- The Multi-Tool Web application vulnerability scanner.☆52Updated 3 years ago
- A simple Cherry Tree template that can be used to organize bug bounties☆37Updated 5 years ago
- ☆36Updated 5 years ago
- Basic Recon For Bug Bounty Hunter - "HuntTheBug" is Basic Scripts For Sub Domain Enumeration> Live Domain Enumeration > Sub Domain Hijack…☆54Updated 3 years ago
- Notes from OSCP, CTF, security adventures, etc...☆60Updated last year
- ☆27Updated 4 years ago
- KARMA is a simple bash script automation that can hit Shodan Premium API and find active IPs, ASN, Common Vulnerabilities, CVEs & Open Po…☆59Updated 3 years ago
- Domain availbility checker☆39Updated 4 years ago
- ParamFirstCheck identifies in a list of urls those containing a parameter of the top 25 of the most vulnerable parameters for SQLi, LFI, …☆35Updated last year
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆76Updated last year
- s3 brute force tool☆44Updated 4 years ago
- ☆53Updated 3 years ago
- ☆14Updated last year
- ☆38Updated 4 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated last week