w4fz5uck5 / Pentest-notesView external linksLinks
Pentest stuff
☆50Nov 30, 2023Updated 2 years ago
Alternatives and similar repositories for Pentest-notes
Users that are interested in Pentest-notes are comparing it to the libraries listed below
Sorting:
- Simple command shell collections☆35Mar 7, 2021Updated 4 years ago
- bug bounty automation☆13Jul 2, 2021Updated 4 years ago
- A collection of famous recon public scripts, but in bash <3☆29Mar 2, 2021Updated 4 years ago
- ⚡ Golang library for quick make pentest tools☆15Apr 7, 2025Updated 10 months ago
- Random Exploits☆50Sep 12, 2023Updated 2 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Jun 23, 2024Updated last year
- ☆10Jun 13, 2024Updated last year
- ☆18Apr 26, 2021Updated 4 years ago
- part of my wordlist to bruteforce DNS to find subdoamains.☆61Jul 26, 2021Updated 4 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- Methodoloy for pentesting web applications.☆10Aug 18, 2022Updated 3 years ago
- Top level domain scanner in Go☆30Sep 24, 2023Updated 2 years ago
- This repository is about Learn | Hack | Share | Repeat.☆11Dec 26, 2022Updated 3 years ago
- My own diary notes. Adding the commands, tools, techniques, and resources that I will not memorize.☆15Jul 5, 2023Updated 2 years ago
- A collection of scripts for bug-bounty related stuff☆39Sep 4, 2020Updated 5 years ago
- BurpSuite Extension for performing scan via CLI.☆14Dec 5, 2017Updated 8 years ago
- ☆10Jan 30, 2022Updated 4 years ago
- A simple vulnerable webapp created by PHP☆12Apr 18, 2025Updated 9 months ago
- ☆13Jan 4, 2022Updated 4 years ago
- Collection of web app methodology from initial recon into exploit known vulnerability. Used when conducting Bug Bounty, Penetration Testi…☆13Oct 23, 2021Updated 4 years ago
- This repository contains a tool that can encrypt all type of files and give the encrypted output in the form of an encrypted shellcode. P…☆16Dec 21, 2021Updated 4 years ago
- Bash script to extract data from the Waybackmachine☆11Mar 15, 2021Updated 4 years ago
- ☆13May 31, 2023Updated 2 years ago
- Subdomain finder☆15Jul 16, 2024Updated last year
- Scanner de vulnerabilidades Web.☆15Sep 6, 2015Updated 10 years ago
- URL-encode data streams via commandline☆14Oct 26, 2019Updated 6 years ago
- Burp extension to increment a parameter in each active scan request☆12Jul 16, 2025Updated 6 months ago
- NeXSS is a modern, self-hosted Blind XSS (Cross-Site Scripting) hunter and callback listener built with Next.js. It helps security resear…☆30Jan 14, 2026Updated 3 weeks ago
- gup aka Get All Urls parameters to create wordlists for brute forcing parameters.☆18Dec 4, 2021Updated 4 years ago
- Bug Bounty Tools☆34Jul 2, 2020Updated 5 years ago
- ☆96May 15, 2020Updated 5 years ago
- a Go code to detect leaks in JS files via regex patterns☆150Oct 20, 2021Updated 4 years ago
- Post-exploitation script developed using impacket☆21Mar 15, 2022Updated 3 years ago
- Identify common attack paths to get Domain Administrator☆22Aug 20, 2019Updated 6 years ago
- Public repo of Nuclei scanner templates.☆21May 22, 2023Updated 2 years ago
- Collection of various malware techniques aimed at Windows through MinGW☆16Aug 24, 2024Updated last year
- Subdomain takeover scanner using Python asyncio☆18Oct 24, 2022Updated 3 years ago
- A collection of GitHub dorks for bug bounty hunters☆18Jun 24, 2022Updated 3 years ago
- Utility to analyse, ingest and push out credentials from common data sources during an internal penetration test.☆19Jun 12, 2022Updated 3 years ago