98 private links
🦚 A web-app pentesting suite written in rust . Contribute to pwnwriter/kanha development by creating an account on GitHub.
âš¡ Blazing-fast tool to grab screenshots of your domain list right from terminal. - GitHub - pwnwriter/haylxon: âš¡ Blazing-fast tool to grab screenshots of your domain list right from terminal.
How to set up an Android Penetration Testing Lab from scratch (AVD without Android Studio) - YouTube
In this video, we explore different ways to create a fully working environment for Android Penetration Testing and we create our setup using the SDK provided...
Contribute to DenisPodgurskii/pentestkit development by creating an account on GitHub.
Hello, we shall run the OWASP juice shop as a deployment, and expose it as a service in a local kubernetes cluster launched with kind. Hence, familiarity with kubernetes deployment and service is essential to follow along. You can try this with any cluster, though I am using a cluster that was launched with kind. For those not aware, kind is a tool that makes launching k8s clusters on your local machine easy.
Welcome to the page where you will find each hacking trick/technique/whatever I have learnt from CTFs, real life apps, reading researches, and news.
Hello, 🌎! Ngrok is a simple tool with an important purpose — make your local services accessible behind a NATed network without having to expose your public IP address. Ngrok is one of my favorite…
A repo to automatically generates and keep updated a series of Docker images through GitHub Actions. - GitHub - cybersecsi/RAUDI: A repo to automatically generates and keep updated a series of Docker images through GitHub Actions.
Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth. - GitHub - sc0tfree/updog: Updog is a replacement for Python's SimpleHTTPServer. It allows uploading and downloading via HTTP/S, can set ad hoc SSL certificates and use http basic auth.
ChopChop is a command-line tool for dynamic application security testing on web applications, initially written by the Michelin CERT.
Its goal is to scan several endpoints and identify exposition of services/files/folders through the webroot. Checks/Signatures are declared in a config file (by default: chopchop.yml), fully configurable, and especially by developers.
BloodHound data collection, aka Sharphound, is quite a complex beast.
When giving BloodHound workshops, the part where I get the most questions is always data collection.
How is the BloodHound data collected? What methods do what? Who am I talking to? How do I fly under the radar?