salecharohit / do-pentestLinks
Spin up a Digital Ocean droplet using Terraform and Ansible
☆12Updated 3 years ago
Alternatives and similar repositories for do-pentest
Users that are interested in do-pentest are comparing it to the libraries listed below
Sorting:
- Scripts and tools for AWS Pentest☆53Updated 4 years ago
- ☆28Updated 6 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆15Updated 4 years ago
- Damn Vulnerable WordPress Site☆51Updated 2 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago
- This script scrapes the list of open Bug Bounty Programs from openbugbounty.org☆27Updated 3 years ago
- ☆19Updated 6 years ago
- ☆90Updated 3 years ago
- ☆53Updated 8 months ago
- random notes☆46Updated 3 months ago
- The project is based on Ben Clark's book: Red Team Field Manual.☆57Updated 8 years ago
- ☆17Updated 4 years ago
- Blind XSS service alerting over slack or email☆31Updated 6 years ago
- Compilation of JavaScript XSS oneliners payloads that rocks your nuts!☆24Updated 8 years ago
- Penetration Testing Methodology - short notes☆11Updated 10 years ago
- Detect exposed API keys on GitHub commits.☆34Updated 3 years ago
- Reconmap's web client written in React. Manage all your pentest projects from a single place.☆51Updated this week
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Updated 4 years ago
- Journey to Try Harder !!!☆33Updated 6 years ago
- Burp Suite Extension to monitor new scope☆17Updated 4 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Presentation presented at DEFCON 27 PHV☆27Updated 6 years ago
- A lab to play with authentication and authorisation problems☆97Updated 2 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- My notes, exercises, and reports on reverse engineering and penetrating applications☆17Updated 6 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- A Modular Framework for the Automated Vulnerability Analysis in IP-based Networks☆66Updated 3 years ago
- WebSocket Connection Smuggler☆47Updated 3 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago