scumdestroy / FatFree-Incendiary-Pentest-Gems
Amassing wealth in the form of biochemical tactical nuclear hack precision strike notes for existential fulfillment and destruction of the opps
☆11Updated 2 years ago
Alternatives and similar repositories for FatFree-Incendiary-Pentest-Gems:
Users that are interested in FatFree-Incendiary-Pentest-Gems are comparing it to the libraries listed below
- If you found this, you are among the truly lucky, to be given providence to my curated and often custom wordlists. Enjoy, buddy, you've…☆37Updated 9 months ago
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆21Updated 2 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆37Updated 4 months ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆15Updated 2 years ago
- Simple python OSINT tool for urls recon thanks to the waybackmachine.☆38Updated last year
- Take potentially dangerous PDFs, office documents, or images and convert them to safe PDFs☆12Updated 2 years ago
- reconFTW is a tool designed to perform automated recon on a target domain by running the best set of tools to perform scanning and findin…☆7Updated 2 years ago
- A bash script that automates the process of service discovery on specified target hosts. The aim of the scripts is reducing scan time, in…☆14Updated last month
- Windows Reverse TCP Shell for Hacking and Pentesting☆23Updated 5 months ago
- Hax is a mini-tool with really useful hacking tools.☆17Updated last year
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- PHP lab to test captcha bypassing☆31Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆26Updated 2 months ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- "Ghost (RAT)" -> Reverse shell and management console for Windows☆16Updated 2 years ago
- Enumeration & fingerprint tool☆24Updated 10 months ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Rockyou for web fuzzing☆14Updated 2 years ago
- ☆9Updated 2 years ago
- Priv8 Tools Offensive Security WordPress_AutoExploiter☆28Updated 2 years ago
- A tool for generating reverse shell payloads on the fly.☆10Updated 2 years ago
- Certina is an OSINT tool for red teamers and bug hunters to discover subdomains from web certificate data☆51Updated 10 months ago
- DDWPasteRecon tool will help you identify code leak, sensitive files, plaintext passwords, password hashes. It also allow member of SOC &…☆37Updated 2 years ago
- This bash script tool, will perform advanced subdomain enumeration, save the results, it will then probe the subdomains into urls, save t…☆25Updated 4 months ago
- web application pentesting tools for docker☆17Updated 2 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆16Updated 3 years ago
- Secrets Patterns DB: The largest open-source Database for detecting secrets, API keys, passwords, tokens, and more.☆9Updated last year
- xdebug 2.5.5 RCE exploit☆29Updated this week