Automatic SQL injection and database takeover tool
-
Updated
Jan 30, 2023 - Python
Automatic SQL injection and database takeover tool
Learn ethical hacking.Learn about reconnaissance,windows/linux hacking,attacking web technologies,and pen testing wireless networks.Resources for learning malware analysis and reverse engineering.
A collection of hacking tools, resources and references to practice ethical hacking.
The Mobile Application Security Testing Guide (MASTG) is a comprehensive manual for mobile app security testing and reverse engineering. It describes the technical processes for verifying the controls listed in the OWASP Mobile Application Security Verification Standard (MASVS).
API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites
Web path scanner
SpiderFoot automates OSINT for threat intelligence and mapping your attack surface.
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) C2 and post-exploitation framework written in python and C
Directory/File, DNS and VHost busting tool written in Go
This repository contains cutting-edge open-source security tools (OST) for a red teamer and threat hunter.
A swiss army knife for pentesting networks
Attack Surface Management Platform | Sn1perSecurity LLC
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
Web Pentesting Fuzz 字典,一个就够了。
The Web Security Testing Guide is a comprehensive Open Source guide to testing the security of web applications and web services.
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."