Pinned Repositories
Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you w
bbot
OSINT automation for hackers.
CloudHunter
AWS, Azure, Alibaba and Google bucket scanner
hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
hello-world
This is a place to store ideas, resources and discussions.
linux-soft-exploit-suggester
Search Exploitable Software on Linux
password-stretcher
FETCH THE PASSWORD STRETCHER
Penetration-List
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.
Pentest-Tools-Collection
pwndoc
Pentest Report Generator
j3tj3rk's Repositories
j3tj3rk/Anti-Virus-Evading-Payloads
During the exploitation phase of a pen test or ethical hacking engagement, you will ultimately need to try to cause code to run on target system computers. Whether accomplished by phishing emails, delivering a payload through an exploit, or social engineering, running code on target computers is part of most penetration tests. That means that you w
j3tj3rk/bbot
OSINT automation for hackers.
j3tj3rk/CloudHunter
AWS, Azure, Alibaba and Google bucket scanner
j3tj3rk/hacktricks
Welcome to the page where you will find each trick/technique/whatever I have learnt in CTFs, real life apps, and reading researches and news.
j3tj3rk/hello-world
This is a place to store ideas, resources and discussions.
j3tj3rk/linux-soft-exploit-suggester
Search Exploitable Software on Linux
j3tj3rk/password-stretcher
FETCH THE PASSWORD STRETCHER
j3tj3rk/Penetration-List
Penetration-List: A comprehensive resource for testers, covering all types of vulnerabilities and materials used in Penetration Testing. Includes payloads, dorks, fuzzing materials, and offers in-depth theory sections. Visit our Medium profile for more information.
j3tj3rk/Pentest-Tools-Collection
j3tj3rk/pwndoc
Pentest Report Generator
j3tj3rk/react-resume-template
A personal resume website template built with React.js, Typescript, Next.js, and styled with Tailwind css
j3tj3rk/RedTeaming-Tactics-and-Techniques
Red Teaming Tactics and Techniques
j3tj3rk/spicoli
Spicolo
j3tj3rk/Red-Teaming-TTPs
Useful Techniques, Tactics, and Procedures for red teamers and defenders, alike!
j3tj3rk/RedTeam-Tools
Tools and Techniques for Red Team / Penetration Testing
j3tj3rk/ScrapPY
ScrapPY is a Python utility for scraping manuals, documents, and other sensitive PDFs to generate wordlists that can be utilized by offensive security tools to perform brute force, forced browsing, and dictionary attacks against targets. The tool dives deep to discover keywords and phrases leading to potential passwords or hidden directories.