Kali Linux Cheat Sheet for Penetration Testers
Welcome to the Penetration Testing Cheat Sheet! This comprehensive guide provides quick references, commands, and techniques for various asp...
Welcome to the Penetration Testing Cheat Sheet! This comprehensive guide provides quick references, commands, and techniques for various asp...
apk2url easily extracts URL and IP endpoints from an APK file and performs filtering into a .txt output. This is suitable for information ga...
A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows.
Here are some common mistakes coders make when doing bug bounty, along with code examples and tips for avoiding them:
Cover your tracks during Linux Exploitation / Penetration Testing by leaving zero traces on system logs and filesystem timestamps.
NetworkSherlock is a powerful and flexible port scanning tool designed for network security professionals and penetration testers. With its ...
CloakQuest3r is a powerful Python tool meticulously crafted to uncover the true IP address of websites safeguarded by Cloudflare, a widely a...
Simple personal script to quickly mass bruteforce common services in a large scale of network. It will check for default credentials on ftp,...
GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)
HBSQLI is an automated command-line tool for performing Header Based Blind SQL injection attacks on web applications. It automates the proce...