PayloadsallthethingsA list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+53849.18%)
Mutual labels: enumeration, penetration-testing, pentest, payload, privilege-escalation
tryhackme-ctfTryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+129.51%)
Mutual labels: cybersecurity, penetration-testing, pentest, exploitation
A Red Teamer DiariesRedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+526.23%)
Mutual labels: cybersecurity, enumeration, penetration-testing, privilege-escalation
PyParser-CVEMulti source CVE/exploit parser.
Stars: ✭ 25 (-59.02%)
Mutual labels: penetration-testing, vulnerabilities, cve, pentest
Active Directory Exploitation Cheat SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+1326.23%)
Mutual labels: enumeration, penetration-testing, exploitation, privilege-escalation
haiti🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+370.49%)
Mutual labels: cybersecurity, pentest, cyber, hackthebox
Hacker Roadmap📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+12608.2%)
Mutual labels: penetration-testing, vulnerabilities, pentest, exploitation
Active Directory Exploitation Cheat SheetA cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+2181.97%)
Mutual labels: enumeration, penetration-testing, exploitation, privilege-escalation
Mida MultitoolBash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+136.07%)
Mutual labels: enumeration, pentest, exploitation, privilege-escalation
reosploitA Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+45.9%)
Mutual labels: cybersecurity, enumeration, exploitation
PayloadsGit All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+4591.8%)
Mutual labels: cybersecurity, pentest, payload
Docker Security Images🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+181.97%)
Mutual labels: cybersecurity, penetration-testing, pentest
inthewilddbHourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+108.2%)
Mutual labels: vulnerabilities, cve, exploitation
CyberQueensCyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩💻👨💻
Stars: ✭ 30 (-50.82%)
Mutual labels: cybersecurity, vulnerabilities, cyber
Cvebase.comcvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (+44.26%)
Mutual labels: cybersecurity, vulnerabilities, cve
PXXTFFramework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-62.3%)
Mutual labels: penetration-testing, pentest, exploitation
moonwalkCover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+791.8%)
Mutual labels: cve, exploitation, privilege-escalation
LuciferA Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+395.08%)
Mutual labels: cybersecurity, enumeration, privilege-escalation