CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
☆30Feb 22, 2023Updated 3 years ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- A repo of useful CyberSec tools/urls, OSINT, Linux security resources, and more.☆28Dec 8, 2024Updated last year
- We want to create a Repo which can provide different Malwares wrote by Python.☆27May 26, 2025Updated 9 months ago
- ☆103Aug 31, 2021Updated 4 years ago
- This repo contains tools that hackers use for penetration testing and web hacking, DNS spoofing, MiTM, malware and more. It's made easy j…☆19Sep 18, 2021Updated 4 years ago
- An open source translation editor specifically designed for native mobile apps☆10Nov 1, 2023Updated 2 years ago
- Offline Security Client☆12Feb 10, 2026Updated last month
- Fast path fuzzing for hidden web directories.☆18Aug 6, 2025Updated 7 months ago
- Some of my short programs of JS☆13Jan 9, 2024Updated 2 years ago
- Sec-Payloads, It's a collection of multiple types of lists used during security assessments & used for bug bounty hunting or penetration …☆10Nov 17, 2025Updated 4 months ago
- An ongoing collection of awesome penetration testing (pentest) tools, software, libraries, learning tutorials, frameworks, academic and p…☆25Dec 28, 2022Updated 3 years ago
- A slick, modern, privacy-focused web interface for viewing and analyzing Nuclei scan results. Built for pentesters & bug hunters who want…☆27Mar 31, 2025Updated 11 months ago
- Chat de uma Pizzaria fake para aula de FRONT-END - SATC☆10May 2, 2024Updated last year
- this tutorial contain a simple explanation for FreeRTOS using neculo-32f303RE☆10Feb 13, 2023Updated 3 years ago
- Quick and dirty reconnaissance hacks for BB and pentesting☆11Feb 20, 2023Updated 3 years ago
- A lightweight Python tool to analyze PCAP files and generate network traffic reports. It detects traffic patterns, security concerns, and…☆18Sep 25, 2024Updated last year
- Tool-X is a kali linux hacking Tool installer. Tool-X developed for termux and other Linux based systems. using Tool-X you can install al…☆15May 17, 2020Updated 5 years ago
- ☆12Feb 23, 2026Updated 3 weeks ago
- Switch Game - is an Engine to create games based on python. It supports many sprites like a StaticSprite, AnimatedSprite, AbsoluteSprite …☆13Mar 17, 2024Updated 2 years ago
- Konsolenprogramme☆17Nov 25, 2021Updated 4 years ago
- Небольшой бандл для расчета энтропии пароля на основе двух методов.☆13Mar 8, 2024Updated 2 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- 📒 Diary app uses GitHub as storage.☆16May 30, 2025Updated 9 months ago
- XSS-Freak is an xss scanner fully written in python3 from scratch. it is one of its kind since it crawls the website for all possible lin…☆15Nov 25, 2019Updated 6 years ago
- PoC code for CVE-2020-16939 Windows Group Policy DACL Overwrite Privilege Escalation☆12Oct 27, 2020Updated 5 years ago
- 🔎 Most Advanced Open Source Intelligence (OSINT) Framework for scanning IP Address, Emails, Websites, Organizations.☆10Dec 2, 2021Updated 4 years ago
- CVE-2022-41040 nuclei template☆19Oct 2, 2022Updated 3 years ago
- XSS scanner tool to scan a list of URLs provided in a .txt file for reflected XSS(rxss) vulnerabilities. This tool is designed to efficie…☆14Jun 29, 2024Updated last year
- Scripts useful in cracking the Vulnhub Lab named View2aKill: 1☆26Feb 1, 2020Updated 6 years ago
- Centralized Active Directory Auditing Tool☆21Oct 28, 2022Updated 3 years ago
- A curated list of awesome telegram osint resources.☆15May 2, 2022Updated 3 years ago
- A windows kernel driver to Block symbolic link exploit used for privilege escalation.☆15Jul 30, 2020Updated 5 years ago
- Template project for Offensive Security Exam Documentation☆11Feb 25, 2020Updated 6 years ago
- Automated Pentest Recon Scanner☆14Oct 6, 2017Updated 8 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Pghostile is a tool to automate the exploitation of PostgreSQL® specific vulnerabilities that could lead to privilege escalation. It can …☆11Aug 17, 2023Updated 2 years ago
- Command-line tool for rendering bar charts that can be displayed directly in the terminal or in text-based files like Markdown.☆19Jul 7, 2024Updated last year
- The NodeJs cookie stealer is a tool that can be used in penetration testing and XSS attacks to steal browser cookies from victims.☆13Apr 5, 2023Updated 2 years ago
- Red Teaming utilities that I can open source. Used in various tests and CTFS☆12Aug 19, 2024Updated last year
- for organizing daily tasks efficiently☆12Oct 3, 2024Updated last year