txuswashere / pentestingLinks
CyberSec Resources: FRAMEWORKS & STANDARDS; Pentesting Audits & Hacking; PURPLE TEAMING, AD, API, web, clouds, CTF, OSINT, Pentest tools, Network Security, Privilege escalation, Exploiting, Reversing, Secure Code, Bug Bounty, ...
☆26Updated 2 years ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- ☆29Updated 3 years ago
- An Automated Mass Network Vulnerability Scanner and Recon Tool☆31Updated last year
- 💀 Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator or Interact.sh☆34Updated 3 years ago
- This cheasheet is aimed at the Red Teamers to help them find diffent tools and methods to create a Commmand and Control Server and exploi…☆81Updated 4 years ago
- New Framework Red Team Operations☆18Updated 4 years ago
- An automated e-mail OSINT tool☆23Updated 3 years ago
- Hacking the Singularity. Deep learning hacking. Weaponizing AI in Offensive security☆99Updated last year
- Tracking my journey towards earning my OSCP. This includes the process of everything that I learn along the way.☆47Updated 3 years ago
- A 1 Liner SQL Injection Attack using SQLMAP and various parameters that helps quickly check for a vulnerabilities during Bug Bounty☆41Updated 10 months ago
- BlueTeam, RedTeam, Bug bounty, CTI, OSINT, Threat Hunting, Network and Web Recon, Discovery, Enumeration, Vulnerability Mapping, Exploita…☆54Updated 3 months ago
- Associated-Threat-Analyzer detects malicious IPv4 addresses and domain names associated with your web application using local malicious d…☆39Updated last year
- OSINT mapping using Twitter, Ficklr, Shodan and Insecam☆22Updated 2 years ago
- It is a project produced to expose the main logic of OSINT-AI tools offered for sale on the DarkWeb☆34Updated last year
- A tool designed to analyse email headers☆36Updated 2 years ago
- Internal Network Penetration Test Playbook☆21Updated 4 years ago
- Deploy your own lab of web application penetration testing with docker and docker-compose, webgoat, dvwap, bwapp and Juice Shop☆71Updated 3 years ago
- Kali Intelligence Suite (KIS) shall aid in the fast, autonomous, central, and comprehensive collection of intelligence by executing stand…☆90Updated last year
- Various Cheat Sheets (e.g. Nmap, Metasploit, Common Ports, Subnetting, Wireshark, etc)☆51Updated 4 years ago
- A learning and testing environment for web application hacking and pentesting.☆27Updated 4 years ago
- ☆31Updated 3 years ago
- This repository contains the PowerShell script for adding and removing the Sticky Key backdoor on Windows☆35Updated 5 years ago
- This tool will resolve a list of Domains, IPs, Hosts, URLs and save the results for valid/invalid fast!☆17Updated 2 years ago
- Goblyn is a Python tool focused to enumeration and capture of website files metadata.☆74Updated 3 years ago
- DevOps for Hackers with Hands-On Labs w/ Ralph May (4-Hour Workshop)☆15Updated 3 years ago
- A Python based Recon Tool to search for Storage Buckets☆11Updated 2 years ago
- Enumeration & fingerprint tool☆25Updated last year
- Hackfruit is an easy search tool that finds hacking tools, commands and cheat sheets. It helps cybersecurity learing and trainings, CTFs,…☆22Updated 2 years ago
- Hacking Methodology, Cheatsheats, Conceptual-Breakdowns☆72Updated 3 weeks ago
- Bash script for CTF automating basic enumeration☆44Updated 3 years ago
- ☆28Updated 2 years ago