Giter Club home page Giter Club logo

Av1at0r's Projects

pentesting-bible icon pentesting-bible

This repository was created and developed by Ammar Amer @cry__pto Only. Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.

pentmenu icon pentmenu

A bash script for recon and DOS attacks

phantalyzer icon phantalyzer

A PhantomJS script for running Wappalyzer over many sites using a headless Webkit browser

phishery icon phishery

An SSL Enabled Basic Auth Credential Harvester with a Word Document Template URL Injector

php-errata icon php-errata

Check function documentation for assistance on code reviews

php-vulnerability-audit-cheatsheet icon php-vulnerability-audit-cheatsheet

This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabilities you generally find with that function.

png-idat-payload-generator icon png-idat-payload-generator

Generate a PNG with a payload embedded in the IDAT chunk (Based off of previous concepts and code -- credit in README)

pocs icon pocs

Proof of Concepts for CVE-2016–3714

poi-slinger icon poi-slinger

Automatically identify serialization issues in PHP Frameworks by means of an Burp Suite active scan

postwoman icon postwoman

👽 API request builder - A free, fast, and beautiful alternative to Postman https://postwoman.io

powerfuzzer icon powerfuzzer

powerfuzzer : Highly automated, fully customizable HTTP protocol based application fuzzer

powersploit icon powersploit

PowerSploit - A PowerShell Post-Exploitation Framework

privatecollaborator icon privatecollaborator

A script for installing private Burp Collaborator with free Let's Encrypt SSL-certificate

privilege-escalation icon privilege-escalation

This cheasheet is aimed at the CTF Players and Beginners to help them understand the fundamentals of Privilege Escalation with examples.

probable-wordlists icon probable-wordlists

Wordlists sorted by probability originally created for password generation and testing

prowler icon prowler

AWS Security Best Practices Assessment, Auditing, Hardening and Forensics Readiness Tool. It follows guidelines of the CIS Amazon Web Services Foundations Benchmark and DOZENS of additional checks including GDPR and HIPAA (+100). Official CIS for AWS guide: https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf

proxenet icon proxenet

The REAL^WONLY Hacker-Friendly proxy for web application pentests.

pub icon pub

police line - do not cross...

Recommend Projects

  • React photo React

    A declarative, efficient, and flexible JavaScript library for building user interfaces.

  • Vue.js photo Vue.js

    🖖 Vue.js is a progressive, incrementally-adoptable JavaScript framework for building UI on the web.

  • Typescript photo Typescript

    TypeScript is a superset of JavaScript that compiles to clean JavaScript output.

  • TensorFlow photo TensorFlow

    An Open Source Machine Learning Framework for Everyone

  • Django photo Django

    The Web framework for perfectionists with deadlines.

  • D3 photo D3

    Bring data to life with SVG, Canvas and HTML. 📊📈🎉

Recommend Topics

  • javascript

    JavaScript (JS) is a lightweight interpreted programming language with first-class functions.

  • web

    Some thing interesting about web. New door for the world.

  • server

    A server is a program made to process requests and deliver data to clients.

  • Machine learning

    Machine learning is a way of modeling and interpreting data that allows a piece of software to respond intelligently.

  • Game

    Some thing interesting about game, make everyone happy.

Recommend Org

  • Facebook photo Facebook

    We are working to build community through open source technology. NB: members must have two-factor auth.

  • Microsoft photo Microsoft

    Open source projects and samples from Microsoft.

  • Google photo Google

    Google ❤️ Open Source for everyone.

  • D3 photo D3

    Data-Driven Documents codes.