Awestome list of pentesting resources.
☆122Oct 19, 2023Updated 2 years ago
Alternatives and similar repositories for awesome-pentester
Users that are interested in awesome-pentester are comparing it to the libraries listed below
Sorting:
- A collection of awesome penetration testing resources, tools and other shiny things☆13May 31, 2015Updated 10 years ago
- Awesome Pentest Tools Collection☆1,624Feb 25, 2026Updated last week
- List of awesome penetration testing resources, tools and other shiny things☆2,717Oct 18, 2023Updated 2 years ago
- HackLiners: CyberSec/BugHunting OneLiners☆62Oct 16, 2024Updated last year
- GraphQL automatic fuzzing tool☆16Jul 16, 2021Updated 4 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆64Jan 26, 2018Updated 8 years ago
- OTP-BYPASS-2022 Signaling System is an international telecommunication protocol standard that defines how the network elements in a publi…☆12Oct 10, 2022Updated 3 years ago
- ☆21Apr 30, 2021Updated 4 years ago
- Awesome Penetration Testing A collection of awesome penetration testing resources☆252Oct 19, 2023Updated 2 years ago
- A java based google hacking tool that allows to do advanced search on google, also to search in google hacking database and exploit datab…☆23Dec 7, 2016Updated 9 years ago
- Only for educational purposes☆12Jun 17, 2023Updated 2 years ago
- A collection of hacks and one-off scripts☆10Jan 18, 2021Updated 5 years ago
- Python WiFi is a Python 3 module that provides read and write access to a wireless network card's capabilities using the Linux Wireless E…☆12Aug 26, 2016Updated 9 years ago
- ☆10Apr 2, 2022Updated 3 years ago
- 🤘 Portable Wi-Fi LED sign controller for festivals (firmware, 2020)☆11Jul 2, 2020Updated 5 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- Sniper. Passive Secrets Hunting.🚬☆13Jun 3, 2022Updated 3 years ago
- A simple script for checking anonymous login as well as bruteforcing ftp accounts.☆10Aug 4, 2023Updated 2 years ago
- A modified version of TomNomNom's anew, allowing for multiple files to be defined as parameters.☆13Jun 17, 2023Updated 2 years ago
- A list of web application security☆6,797Feb 27, 2026Updated last week
- Playground for Race Condition attack☆24Mar 18, 2023Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Apr 8, 2022Updated 3 years ago
- Gouge is a simple Burp extension to extract or gouge all URLs which are seen in JS files as you visit different websites/webpages in Burp…☆28Jul 21, 2024Updated last year
- A collection of tutorials, CTFs, wargames, articles, and other resources for Smart Contract security.☆14Jun 4, 2022Updated 3 years ago
- Vulnerable web site. Used to test sentinel features.☆11Nov 18, 2016Updated 9 years ago
- Some scripts useful for red team activities☆13Jan 18, 2020Updated 6 years ago
- A Web-UI for subdomain enumeration (subfinder)☆56Jun 5, 2020Updated 5 years ago
- The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.☆31Oct 27, 2025Updated 4 months ago
- swagroutes is a command-line tool that extracts and lists API routes from Swagger files in YAML or JSON format.☆61Apr 23, 2023Updated 2 years ago
- The decentralized, completely anonymous, lightweight, peer-to-peer network communication protocol.☆26Jul 21, 2019Updated 6 years ago
- Kiddy - (linux) kernel identity spoofer☆15Mar 18, 2024Updated last year
- ☆14Mar 8, 2023Updated 2 years ago
- [Disclaimer FireROOT] This repository is for research purposes only, the use of this code is your responsibility. CONTACT ME: Attack@dark…☆13Jan 24, 2023Updated 3 years ago
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Feb 12, 2022Updated 4 years ago
- ☆755Aug 26, 2022Updated 3 years ago
- Fuzz for hidden proxies, vhosts, and URLs☆15Jun 21, 2021Updated 4 years ago
- White Hat Arsenal is a collection of very useful scripts, exploits and books.☆13Dec 4, 2019Updated 6 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Mar 13, 2023Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆41Apr 10, 2023Updated 2 years ago