wlopezr's repositories
acunetix
acunetix 13 crack by mtd
APSoft-Web-Scanner-v2
Powerful dork searcher and vulnerability scanner for windows platform
AWE-OSEE-Prep
Advanced Windows Exploitation (AWE)/Offensive Security Exploitation Expert (OSEE) Preparation for BlackHat 2020
bugbountytip.com
Flask powered website to display tweets with a hashtag #bugbountytip
owasp.github.io
OWASP Foundation main site repository
SecLists
SecLists is the security tester's companion. It's a collection of multiple types of lists used during security assessments, collected in one place. List types include usernames, passwords, URLs, sensitive data patterns, fuzzing payloads, web shells, and many more.
APSoft-WebScanner
Automated dork searcher and vulnerability scanner
AutoRecon
AutoRecon is a multi-threaded network reconnaissance tool which performs automated enumeration of services.
awesome-bug-bounty
A comprehensive curated list of available Bug Bounty & Disclosure Programs and Write-ups.
BruteShark
Network Analysis Tool
ceso.github.io
Repo for hugo generated files
fuzzdb
Dictionary of attack patterns and primitives for black-box application fault injection and resource discovery.
ghidra
Ghidra is a software reverse engineering (SRE) framework
HTTP-Reverse-Shell
A HTTP Reverse Shell in Python
malwoverview
Malwoverview is a first response tool to perform an initial and quick triage in a directory containing malware samples, specific malware sample, suspect URL and domains. Additionally, it allows to download and send samples to main online sandboxes.
metasploit-framework
Metasploit Framework
Mitigating-Web-Shells
Guidance for mitigation web shells. #nsacyber
pentest
:no_entry: offsec batteries included
Resources-for-Beginner-Bug-Bounty-Hunters
A list of resources for those interested in getting started in bug bounties
tbhm
The Bug Hunters Methodology
torghost
TorGhost is an anonymization script. TorGhost redirects all internet traffic through SOCKS5 tor proxy. DNS requests are also redirected via tor, thus preventing DNSLeak. The scripts also disables unsafe packets exiting the system. Some packets like ping request can compromise your identity.
WebHackersWeapons
⚔️ Web Hacker's Weapons / A collection of cool tools used by Web hackers. Happy hacking , Happy bug-hunting
Windows-Exploit-Suggester
This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on the target. It also notifies the user if there are public exploits and Metasploit modules available for the missing bulletins.
windows-privesc-check
Standalone Executable to Check for Simple Privilege Escalation Vectors on Windows Systems
wstg
The Web Security Testing Guide is a comprehensive open source guide to testing the security of web applications and web services.