pathakabhi24 / Infosec-ResourcesLinks
This repository is an overview of what resources you need in cybersecurity which we called infosec and a collection of hacking tools, resources and references to practice ethical hacking it helps you to make your knowledge more perfect in this domain
☆15Updated last year
Alternatives and similar repositories for Infosec-Resources
Users that are interested in Infosec-Resources are comparing it to the libraries listed below
Sorting:
- Convert domain lists to resolved IP without duplicated, useful for strong large recon, and Bug Bounty☆14Updated 4 years ago
- Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target s…☆15Updated 3 months ago
- A productivity burp extension which reminds to take break while you are at work!☆17Updated 5 years ago
- Reflected Cross-Site Scripting (XSS) vulnerability in 'index.php' login-portal webpage of SourceCodesters Tailor Management System v1.0 a…☆24Updated 4 years ago
- Exploits for some of the vulnerabilities I have discovered☆18Updated 4 years ago
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 4 years ago
- XXE Injection Payloads☆28Updated 5 years ago
- Listing of my writeups from HackTheBox, VulnHub, TryHackMe, others...☆19Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆12Updated 5 years ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆39Updated 3 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- Collection of fuzzing payloads and corpus from all around added as sub modules☆14Updated last month
- Magento Security Scanner☆15Updated 3 years ago
- Automated Recon Framework☆24Updated 4 years ago
- Workflow for pentesting web applications.☆21Updated 6 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 4 years ago
- CVE, reports, research☆17Updated 4 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Updated 3 years ago
- Perform OSINT on external targets using Shodan☆22Updated last year
- Ideaslocas Repository☆37Updated 4 years ago
- ☆11Updated 6 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- Static analysis of APKs with regular expressions☆10Updated 4 years ago
- DNS hijacking via dead records automation tool☆53Updated 4 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- Tool to brute website sub-domains and dirs.☆47Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆37Updated 7 years ago
- DNS Misconfiguration : S0x4 - Same Site Scripting Scanner☆16Updated 4 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago