vulp3cula / hackers-grimoireLinks
My pen testing notes
☆52Updated 2 years ago
Alternatives and similar repositories for hackers-grimoire
Users that are interested in hackers-grimoire are comparing it to the libraries listed below
Sorting:
- ☆20Updated 3 years ago
- Pentest stuff☆49Updated last year
- Information-Gathering Shell Script☆30Updated 4 years ago
- Some Buffer Overflow Automation Scripts I'll be using between PWK labs and Exam!☆19Updated 4 years ago
- ☆31Updated 4 years ago
- Tool to generate csrf payloads based on vulnerable requests☆64Updated 4 years ago
- Target practice for ffuf☆65Updated 3 years ago
- OSWE Preparation☆37Updated 6 years ago
- Reverse shell based on https://scriptdotsh.com/index.php/2018/09/04/malware-on-steroids-part-1-simple-cmd-reverse-shell/☆31Updated 6 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- Static analysis of wordpress plugins☆62Updated 4 years ago
- ☆14Updated 4 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Create visualization from Shodan query☆73Updated 4 years ago
- Create wordlists from source codes files/directories for enumeration☆30Updated last year
- ☆24Updated 6 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 5 years ago
- A command line tool to search AttackerKB.☆52Updated 4 years ago
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Another Subdomain ENumeration Tool☆12Updated 2 years ago
- Just another vulnerable web application.☆36Updated 10 months ago
- ☆38Updated 3 years ago
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆41Updated 4 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 6 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆43Updated 4 months ago
- Detect, manage and exploit Blind Cross-site scripting (XSS) vulnerabilities.☆42Updated 2 years ago
- Pipe different tools with google dork Scanner☆56Updated 4 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- ☆22Updated 4 years ago