qazbnm456 / awesome-security-trivia
π€ Security Trivia that rare people know.
β161Updated 5 years ago
Alternatives and similar repositories for awesome-security-trivia:
Users that are interested in awesome-security-trivia are comparing it to the libraries listed below
- The Bug Bounty Wikiβ172Updated 6 years ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.β164Updated 5 years ago
- Various Payload wordlistsβ235Updated 4 years ago
- Fuzzing Payloads to Assist in Web Application Testing.β166Updated 5 years ago
- β121Updated 8 years ago
- Tools of "The Bug Hunters Methodology V2 by @jhaddix"β198Updated 7 years ago
- stuff i'm willing to share with the world lolβ171Updated 2 years ago
- β265Updated 6 years ago
- A tool used to check if a CNAME resolves to the scope address. If the CNAME resolves to a non-scope address it might be worth checking ouβ¦β133Updated last year
- β136Updated 7 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cerβ¦β286Updated 3 months ago
- Penetration Testing Playbook (PTP)β175Updated 6 years ago
- Payloads for CRLF Injectionβ223Updated 6 months ago
- A simple variable based template editor using handlebarjs+strapdownjs. The idea is to use variables in markdown based files to easily repβ¦β253Updated last year
- Notes/Tools for pentestingβ82Updated last year
- This tool is for automate the initial things that we usually do in daily pentesting. So you can focus more on the main target.β75Updated 5 years ago
- Usefull stuff from around teh internetzβ110Updated 7 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearchβ214Updated 6 months ago
- Custom checklists, cheatsheets, links, and scriptsβ125Updated 5 years ago
- Collection of different exploitsβ182Updated 4 years ago
- A cheat sheet for attacking SQLite via SQLiβ99Updated 9 years ago
- A collection of the solutions people wrote for the H1-212 Capture The Flag eventβ95Updated 6 years ago
- Linux post exploitation enumeration and exploit checking toolsβ179Updated 5 years ago
- My Recon Automationβ194Updated 3 years ago
- SHELLING - a comprehensive OS command injection payload generatorβ108Updated 5 years ago
- OSCP All Tools are Here ...!! ***β1Updated 4 years ago
- Burp Suite Extension to monitor new scopeβ197Updated 4 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabiβ¦β353Updated last month
- Automatic tool for DNS rebinding-based SSRF attacksβ299Updated 4 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLTβ398Updated this week