Pentest Checklists
☆21Aug 23, 2020Updated 5 years ago
Alternatives and similar repositories for pentest-checklists
Users that are interested in pentest-checklists are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- EH-Bble☆10Jul 23, 2019Updated 6 years ago
- ☆33Jul 20, 2021Updated 4 years ago
- A wordlist for brute forcing directories / files☆10Jul 7, 2015Updated 10 years ago
- Toolset for detecting reflected xss in websites☆16Oct 6, 2018Updated 7 years ago
- scripts & notes☆13Nov 4, 2019Updated 6 years ago
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- All-in Fuzzer. Burp suite extension for auto fuzzing params, headers, body☆36Updated this week
- Project Title : Library-Management-System-App Project Type : Desktop windows application system for library Technology : Visual CSharp Pr…☆10Nov 26, 2023Updated 2 years ago
- Postman Integration is an extension for burp to generate Postman collection fomat json file.☆20Sep 7, 2022Updated 3 years ago
- subBruter is a tool designed to efficiently probe for alive subdomins from a provided wordlist.☆28Jan 29, 2024Updated 2 years ago
- Play the Flappy Bird Game using PyGAD (Genetic Algorithm)☆19Apr 18, 2023Updated 2 years ago
- Proof of Concept Exploit for CVE-2024-9465☆31Oct 9, 2024Updated last year
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Jul 14, 2017Updated 8 years ago
- A micro-framework and tool for performing reconnaissance.☆40Jan 15, 2026Updated 2 months ago
- Just a better dirbuster☆13Dec 8, 2022Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Ragno is a Passive URL Crawler | Written in Python3 | Fetches URLs from the Wayback Machine, AlienVault's Open Threat Exchange & Common C…☆21Sep 1, 2025Updated 7 months ago
- Right-To-Left Override POC☆35Mar 21, 2022Updated 4 years ago
- 🪄 XSSDynaGen is a tool designed to analyze URLs with parameters, identify the characters allowed by the server, and generate advanced XS…☆55Mar 24, 2026Updated 2 weeks ago
- A tool designed to detect the vulnerability **CVE-2025-31650** in Apache Tomcat (versions 10.1.10 to 10.1.39)☆20Apr 30, 2025Updated 11 months ago
- A collaborative hub for Nuclei templates. Contribute, share, and explore powerful vulnerability detection tools!☆50Feb 1, 2025Updated last year
- ☆55Aug 22, 2017Updated 8 years ago
- A quick reference for understanding the nature and severity of vulnerabilities in TLS configurations and implementations.☆29Apr 6, 2020Updated 6 years ago
- A Windows tool that converts LDIF files to BloodHound CE☆31Dec 20, 2025Updated 3 months ago
- A command-line tool for Cross-Site WebSocket Hijacking☆44Oct 18, 2023Updated 2 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- ☆20Jan 12, 2022Updated 4 years ago
- OWASP Foundation Web Respository☆37Oct 3, 2025Updated 6 months ago
- Modified version of PEAS client for offensive operations☆50Nov 1, 2025Updated 5 months ago
- ☆26Jan 23, 2025Updated last year
- Collection of various WINAPI tricks / features used or abused by Malware☆12Mar 28, 2022Updated 4 years ago
- Inject code into .net applications☆13Nov 7, 2018Updated 7 years ago
- A lightweight test harness designed to speed up shellcode development by providing an execution environment with integrated crash diagnos…☆43Jan 15, 2026Updated 2 months ago
- CPU/Battery power management tool for Linux systems