Change the repository type filter
All
Repositories list
12 repositories
Kali-Linux-Configuration
PublicComprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Vulnerable-Box-Resources
PublicVulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides detailed insights into the inner workings of your target systems, making it easier to identify potential security gaps, weaknesses, and attack vectors.- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prepare for interviews by providing a comprehensive list of questions, answers, and insights into security concepts and practices.
Offensive-Payloads
Public- Vulnerable Docker containers designed to simulate vulnerable services for enthusiasts looking to sharpen their skills in identifying, exploiting, and enumerating vulnerabilities in a controlled environment.
Offensive-Pentesting-Web
PublicSubdomain-Takeovers
PublicThis repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and resources to perform subdomain takeover attacks.Offensive-Recon
PublicPassive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.