Pinned Repositories
Kali-Linux-Configuration
Offensive-Payloads
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
Offensive-Pentesting-Host
Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
Offensive-Pentesting-Lab
Offensive-Pentesting-Resources
Offensive-Pentesting-Scripts
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Offensive-Pentesting-Web
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
Offensive-Recon
Penetration-Testing-Interview-Questions
Subdomain-Takeovers
This repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and resources to perform subdomain takeover attacks.
Infosec Warrior's Repositories
InfoSecWarrior/Offensive-Payloads
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
InfoSecWarrior/Offensive-Pentesting-Scripts
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
InfoSecWarrior/Offensive-Pentesting-Host
Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
InfoSecWarrior/Offensive-Pentesting-Web
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
InfoSecWarrior/Penetration-Testing-Interview-Questions
InfoSecWarrior/Kali-Linux-Configuration
InfoSecWarrior/Offensive-Recon
InfoSecWarrior/Subdomain-Takeovers
This repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and resources to perform subdomain takeover attacks.
InfoSecWarrior/Offensive-Pentesting-Resources
InfoSecWarrior/Offensive-Pentesting-Lab
InfoSecWarrior/Linux-Server-Administrator-Exam-Report
Linux Server Administrator Exam Report
InfoSecWarrior/Vulnerable-Box-Resources
Vulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides detailed insights into the inner workings of your target systems, making it easier to identify potential security gaps, weaknesses, and attack vectors.