Awesome Open Source
Search
Programming Languages
Languages
All Categories
Categories
About
Search results for exploitation recon
exploitation
x
recon
x
18 search results found
Red Teaming Toolkit
⭐
8,230
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
Winpwn
⭐
3,151
Automation for internal Windows Penetrationtest / AD-Security
Pentest Notes
⭐
1,202
Active Directory Exploitation Cheat Sheet
⭐
659
A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.
Ilo4_toolbox
⭐
399
Toolbox for HPE iLO4 & iLO5 analysis
Awesome Bbht
⭐
390
A bash script that will automatically install a list of bug hunting tools that I find interesting for recon, exploitation, etc. (minus burp) For Ubuntu/Debain.
Anticheat Testing Framework
⭐
368
Framework to test any Anti-Cheat
Android Security Exploits Youtube Curriculum
⭐
357
🔓A curated list of modern Android exploitation conference talks.
Theo
⭐
263
Ethereum recon and exploitation tool.
Shiva
⭐
222
An Ansible playbook to provision a host for penetration testing and CTF challenges
Reconky Automated_bash_script
⭐
170
Reconky is an great Content Discovery bash script for bug bounty hunters which automate lot of task and organized in the well mannered form which help them to look forward.
Web_hacking
⭐
135
Bug Bounty Tricks and useful payloads and bypasses for Web Application Security.
Pavelow
⭐
85
PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting proccess with a few other goodies added to aid your fight.
V1ew S0urce
⭐
78
v1ew-s0urce a recon tool built by the 5/9Dark team.
Archive
⭐
65
Hacking Methodology, Cheatsheats, Conceptual-Breakdowns
Awesome Infosec
⭐
52
A curated list of awesome infosec blog posts, courses, books and more!
Sifter
⭐
49
Sifter - All purpose penetration testing op-center
Utimaco
⭐
39
Tools for reverse engineering the Utimaco Firmware
Red Team Tools
⭐
27
Crawleet
⭐
25
Web Recon & Exploitation Tool.
Interesting Things
⭐
20
Single-WebApp-Target essentials testing methodology tool starting at recon-information gathering for the juicy stuff ended up in exploitation.
Web Exploitation Workflow
⭐
20
Web Exploitation Workflow for CTF Challenges
Ctf Challenge
⭐
20
An attempt to unite CTF players and bug bounty hunters by sharing a binary that needs CTF-style attention.
Recondashboard
⭐
16
Dashboard containing various recon tools
Waflulz
⭐
13
WAF Exploitation Framework
Ctfman_pages
⭐
12
The yaml documents for the CTFman search system.
Hunterseye
⭐
9
HuntersEye is designed for Bug Bounty Hunters, and Security Researchers to monitor new subdomains and certificates for specified domains. The primary goal is to streamline and expedite the process of monitoring newly registered subdomains and SSL certificates related to specified target domains.
How To Start Ctf From Scratch
⭐
8
CTF Beginners Guide!!
Ruby Recon
⭐
6
A recon tool using ruby-nmap
Infosec
⭐
5
infosec stuff
Recon2016
⭐
5
BBS-Era Exploitation for Fun and Anachronism
Related Searches
Python Exploitation (1,675)
Exploitation Cve (771)
Vulnerabilities Exploitation (676)
C Exploitation (545)
Exploitation Penetration Testing (392)
Python Recon (372)
1-18 of 18 search results
Privacy
|
About
|
Terms
|
Follow Us On Twitter
Copyright 2018-2024 Awesome Open Source. All rights reserved.