All Projects → Writeups → Similar Projects or Alternatives

1480 Open source projects that are alternatives of or similar to Writeups

Payloadsallthethings
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
Stars: ✭ 32,909 (+53849.18%)
Hacker Roadmap
📌 Your beginner pen-testing start guide. A guide for amateur pen testers and a collection of hacking tools, resources and references to practice ethical hacking and web security.
Stars: ✭ 7,752 (+12608.2%)
tryhackme-ctf
TryHackMe CTFs writeups, notes, drafts, scrabbles, files and solutions.
Stars: ✭ 140 (+129.51%)
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 1,392 (+2181.97%)
Mida Multitool
Bash script purposed for system enumeration, vulnerability identification and privilege escalation.
Stars: ✭ 144 (+136.07%)
CVE-2021-44228-PoC-log4j-bypass-words
🐱‍💻 ✂️ 🤬 CVE-2021-44228 - LOG4J Java exploit - WAF bypass tricks
Stars: ✭ 760 (+1145.9%)
Mutual labels:  cybersecurity, cve, pentest, payload
haiti
🔑 Hash type identifier (CLI & lib)
Stars: ✭ 287 (+370.49%)
Mutual labels:  cybersecurity, pentest, cyber, hackthebox
Active Directory Exploitation Cheat Sheet
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Stars: ✭ 870 (+1326.23%)
A Red Teamer Diaries
RedTeam/Pentest notes and experiments tested on several infrastructures related to professional engagements.
Stars: ✭ 382 (+526.23%)
PyParser-CVE
Multi source CVE/exploit parser.
Stars: ✭ 25 (-59.02%)
Lucifer
A Powerful Penetration Tool For Automating Penetration Tasks Such As Local Privilege Escalation, Enumeration, Exfiltration and More... Use Or Build Automation Modules To Speed Up Your Cyber Security Life
Stars: ✭ 302 (+395.08%)
argus
Argus Advanced Remote & Local Keylogger For macOS and Windows
Stars: ✭ 87 (+42.62%)
Suid3num
A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binaries, cross-match those with bins in GTFO Bin's repository & auto-exploit those, all with colors! ( ͡~ ͜ʖ ͡°)
Stars: ✭ 342 (+460.66%)
Awesome Vulnerable
A curated list of VULNERABLE APPS and SYSTEMS which can be used as PENETRATION TESTING PRACTICE LAB.
Stars: ✭ 133 (+118.03%)
Pakuri
Penetration test Achieve Knowledge Unite Rapid Interface
Stars: ✭ 125 (+104.92%)
Pentest Guide
Penetration tests guide based on OWASP including test cases, resources and examples.
Stars: ✭ 1,316 (+2057.38%)
Mutual labels:  penetration-testing, pentest, payload
moonwalk
Cover your tracks during Linux Exploitation by leaving zero traces on system logs and filesystem timestamps. 👻🐚
Stars: ✭ 544 (+791.8%)
Patrowlhears
PatrowlHears - Vulnerability Intelligence Center / Exploits
Stars: ✭ 89 (+45.9%)
Mutual labels:  cybersecurity, vulnerabilities, cve
Sudo killer
A tool to identify and exploit sudo rules' misconfigurations and vulnerabilities within sudo for linux privilege escalation.
Stars: ✭ 1,073 (+1659.02%)
Mutual labels:  cve, pentest, privilege-escalation
Cvebase.com
cvebase is a community-driven vulnerability data platform to discover the world's top security researchers and their latest disclosed vulnerabilities & PoCs
Stars: ✭ 88 (+44.26%)
Mutual labels:  cybersecurity, vulnerabilities, cve
Linux Smart Enumeration
Linux enumeration tool for pentesting and CTFs with verbosity levels
Stars: ✭ 1,956 (+3106.56%)
Mutual labels:  privilege-escalation, ctfs, hackthebox
Sifter
Sifter aims to be a fully loaded Op Centre for Pentesters
Stars: ✭ 403 (+560.66%)
HostEnumerator
A tool that automates the process of enumeration
Stars: ✭ 29 (-52.46%)
Mutual labels:  cybersecurity, enumeration, hackthebox
Reconky-Automated Bash Script
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Stars: ✭ 167 (+173.77%)
Wadcoms.github.io
WADComs is an interactive cheat sheet, containing a curated list of Unix/Windows offensive tools and their respective commands.
Stars: ✭ 431 (+606.56%)
Rapidscan
🆕 The Multi-Tool Web Vulnerability Scanner.
Stars: ✭ 775 (+1170.49%)
maalik
Feature-rich Post Exploitation Framework with Network Pivoting capabilities.
Stars: ✭ 75 (+22.95%)
Fdsploit
File Inclusion & Directory Traversal fuzzing, enumeration & exploitation tool.
Stars: ✭ 199 (+226.23%)
PXXTF
Framework For Exploring kernel vulnerabilities, network vulnerabilities ✨
Stars: ✭ 23 (-62.3%)
CVE-2021-41773 CVE-2021-42013
Apache HTTP Server 2.4.49, 2.4.50 - Path Traversal & RCE
Stars: ✭ 20 (-67.21%)
Mutual labels:  cve, pentest, payload
Docker Security Images
🔐 Docker Container for Penetration Testing & Security
Stars: ✭ 172 (+181.97%)
Payloads
Git All the Payloads! A collection of web attack payloads.
Stars: ✭ 2,862 (+4591.8%)
Mutual labels:  cybersecurity, pentest, payload
reosploit
A Tool that Finds, Enumerates, and Exploits Reolink Cameras.
Stars: ✭ 89 (+45.9%)
inthewilddb
Hourly updated database of exploit and exploitation reports
Stars: ✭ 127 (+108.2%)
Mutual labels:  vulnerabilities, cve, exploitation
Pwndoc
Pentest Report Generator
Stars: ✭ 417 (+583.61%)
Awesome Nodejs Security
Awesome Node.js Security resources
Stars: ✭ 1,294 (+2021.31%)
CyberQueens
CyberQueens lesson materials - learning resources and exercises for aspiring reverse engineers, exploit developers, and hackers 👩‍💻👨‍💻
Stars: ✭ 30 (-50.82%)
Mutual labels:  cybersecurity, vulnerabilities, cyber
Offensive-Reverse-Shell-Cheat-Sheet
Offensive Reverse Shell (Cheat Sheet)
Stars: ✭ 138 (+126.23%)
censys-recon-ng
recon-ng modules for Censys
Stars: ✭ 29 (-52.46%)
PocOrExp in Github
聚合Github上已有的Poc或者Exp,CVE信息来自CVE官网。Auto Collect Poc Or Exp from Github by CVE ID.
Stars: ✭ 544 (+791.8%)
Mutual labels:  vulnerabilities, cve
pwn-pulse
Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)
Stars: ✭ 126 (+106.56%)
Mutual labels:  penetration-testing, cve
haaukins
A Highly Accessible and Automated Virtualization Platform for Security Education
Stars: ✭ 148 (+142.62%)
Mutual labels:  cybersecurity, hackthebox
CTF-Writeups
Repository of my CTF writeups
Stars: ✭ 25 (-59.02%)
Mutual labels:  cybersecurity, hackthebox
massh-enum
OpenSSH 2.3 up to 7.4 Mass Username Enumeration (CVE-2018-15473).
Stars: ✭ 136 (+122.95%)
Mutual labels:  enumeration, cve
rawsec-cybersecurity-inventory
An inventory of tools and resources about CyberSecurity that aims to help people to find everything related to CyberSecurity.
Stars: ✭ 153 (+150.82%)
Mutual labels:  cybersecurity, cyber
vulnerabilities
List of every possible vulnerabilities in computer security.
Stars: ✭ 14 (-77.05%)
exploiting
Exploiting challenges in Linux and Windows
Stars: ✭ 122 (+100%)
Mutual labels:  pwn, exploitation
huntkit
Docker - Ubuntu with a bunch of PenTesting tools and wordlists
Stars: ✭ 51 (-16.39%)
Mutual labels:  penetration-testing, pentest
awesome-ddos-tools
Collection of several DDos tools.
Stars: ✭ 75 (+22.95%)
Spray365
Spray365 makes spraying Microsoft accounts (Office 365 / Azure AD) easy through its customizable two-step password spraying approach. The built-in execution plan features options that attempt to bypass Azure Smart Lockout and insecure conditional access policies.
Stars: ✭ 233 (+281.97%)
Mutual labels:  enumeration, pentest
zBuster
Bash script for CTF automating basic enumeration
Stars: ✭ 20 (-67.21%)
Mutual labels:  enumeration, hackthebox
Pentest-Service-Enumeration
Suggests programs to run against services found during the enumeration phase of a Pentest
Stars: ✭ 80 (+31.15%)
Mutual labels:  pentest, privilege-escalation
AttackSurfaceManagement
Discover the attack surface and prioritize risks with our continuous Attack Surface Management (ASM) platform - Sn1per Professional #pentest #redteam #bugbounty
Stars: ✭ 45 (-26.23%)
DrGadget
dr.rer.oec.gadget IDAPython plugin for the Interactive Disassembler <ABANDONED PROJECT>
Stars: ✭ 61 (+0%)
Mutual labels:  vulnerabilities, exploitation
URL-obfuscator
Python Program to obfuscate URLs to make Phishing attacks more difficult to detect. Uses Active open redirect list and other URL obfuscation techniques.
Stars: ✭ 101 (+65.57%)
Mutual labels:  cybersecurity, cyberattack
volana
🌒 Shell command obfuscation to avoid detection systems
Stars: ✭ 38 (-37.7%)
Mutual labels:  pentest, exploitation
ggtfobins
Get GTFOBins info about a given exploit from the command line
Stars: ✭ 27 (-55.74%)
Mutual labels:  enumeration, penetration-testing
Linux-Kernel-Exploitation
Linux kernel development & exploitation lab.
Stars: ✭ 130 (+113.11%)
Mutual labels:  pwn, privilege-escalation
graphw00f
graphw00f is GraphQL Server Engine Fingerprinting utility for software security professionals looking to learn more about what technology is behind a given GraphQL endpoint.
Stars: ✭ 260 (+326.23%)
Mutual labels:  enumeration, penetration-testing
auto-recon-ng
Automated script to run all modules for a specified list of domains, netblocks or company name
Stars: ✭ 17 (-72.13%)
Mutual labels:  enumeration, penetration-testing
1-60 of 1480 similar projects