Change the repository type filter
All
Repositories list
24 repositories
- Vulnerable Docker containers designed to simulate vulnerable services for enthusiasts looking to sharpen their skills in identifying, exploiting, and enumerating vulnerabilities in a controlled environment.
Offensive-Recon
PublicPassive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.Offensive-Enumeration
PublicPenetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.- Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prepare for interviews by providing a comprehensive list of questions, answers, and insights into security concepts and practices.
Vulnerable-Box-Resources
PublicVulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides detailed insights into the inner workings of your target systems, making it easier to identify potential security gaps, weaknesses, and attack vectors.Linux-Servers
PublicGuides for installing, configuring, and managing various Linux-based server services. It covers both foundational and advanced topics related to server administration, making it a valuable resource for sysadmins working with Linux servers.Offensive-Nmap
Public- Computer Networking Essentials is a beginner-friendly resource covering fundamental networking concepts and system basics.
- Covering fundamental Linux concepts, from basic commands to advanced topics like string processing, file management, user and group management, networking, process control, firewall configuration, task scheduling, and more.
Offensive-File-Transfer
PublicCollection of file transfer techniques for both Linux and Windows environments. It covers protocols and tools to help transfer files locally, remotely, and cross-platform, making it a handy resource for system administrators, penetration testers.- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Offensive-Pentesting-Web
PublicA proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.Kali-Linux-Configuration
PublicComprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.Offensive-Payloads
PublicSubdomain-Takeovers
PublicThis repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and resources to perform subdomain takeover attacks.