A collection of various awesome lists for hackers, pentesters and security researchers
-
Updated
Oct 4, 2020
{{ message }}
A collection of various awesome lists for hackers, pentesters and security researchers
A list of useful payloads and bypass for Web Application Security and Pentest/CTF
A collection of hacking / penetration testing resources to make you better!
This repository is primarily maintained by Omar Santos and includes thousands of resources related to ethical hacking / penetration testing, digital forensics and incident response (DFIR), vulnerability research, exploit development, reverse engineering, and more.
Infection Monkey - An automated pentest tool
Web path scanner
Nishang - Offensive PowerShell for red team, penetration testing and offensive security.
Complete Mandiant Offensive VM (Commando VM), a fully customizable Windows-based pentesting virtual machine distribution. commandovm@fireeye.com
An Information Security Reference That Doesn't Suck
A curated list of awesome infosec courses and training resources.
A list of web application security
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Collaborative Penetration Test and Vulnerability Management Platform
Web Application Security Scanner Framework
Fully automated offensive security framework for reconnaissance and vulnerability scanning
Next generation web scanner
Free Security and Hacking eBooks
Top 100 Hacking & Security E-Books (Free Download)
The LAZY script will make your life easier, and of course faster.
渗透测试有关的POC、EXP、脚本、提权、小工具等,欢迎补充、完善---About penetration-testing python-script poc getshell csrf xss cms php-getshell domainmod-xss penetration-testing-poc csrf-webshell cobub-razor cve rce sql sql-poc poc-exp bypass oa-getshell cve-cms
Please select one:
ullaakut/cameradarPlease select one:
Collection of the cheat sheets useful for pentesting
Custom bash scripts used to automate various penetration testing tasks including recon, scanning, parsing, and creating malicious payloads and listeners with Metasploit.
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
Advanced vulnerability scanning with Nmap NSE
The AWS exploitation framework, designed for testing the security of Amazon Web Services environments.
Add a description, image, and links to the penetration-testing topic page so that developers can more easily learn about it.
To associate your repository with the penetration-testing topic, visit your repo's landing page and select "manage topics."
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p adminI see the following r