Change the repository type filter
All
Repositories list
24 repositories
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentestin…
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effect…
- Vulnerable Docker containers designed to simulate vulnerable services for enthusiasts looking to sharpen their skills in identifying, exploiting, and enumeratin…
Offensive-Recon
PublicPassive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. T…
- Vulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides…
Linux-Servers
PublicGuides for installing, configuring, and managing various Linux-based server services. It covers both foundational and advanced topics related to server administ…Offensive-Nmap
PublicOffensive Nmap guide for penetration testers and red teamers. Includes practical examples, evasion techniques, and advanced usage for network reconnaissance and…- Computer Networking Essentials is a beginner-friendly resource covering fundamental networking concepts and system basics.
Linux-Essentials
PublicCovering fundamental Linux concepts, from basic commands to advanced topics like string processing, file management, user and group management, networking, proc…Vulnerability-Scanners
PublicOffensive-Tunneling
PublicOffensive-File-Transfer
PublicCollection of file transfer techniques for both Linux and Windows environments. It covers protocols and tools to help transfer files locally, remotely, and cros…Offensive-Pentesting-Web
PublicA proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference c…Kali-Linux-Configuration
PublicComprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository s…Offensive-Payloads
PublicList of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.- Linux Server Administrator Exam Report
Subdomain-Takeovers
PublicThis repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and r…