Infosec Warrior
Popular repositories Loading
-
Offensive-Payloads
Offensive-Payloads PublicList of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
-
Offensive-Pentesting-Scripts
Offensive-Pentesting-Scripts PublicScripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
-
Offensive-Pentesting-Host
Offensive-Pentesting-Host PublicPenetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and…
-
Offensive-Pentesting-Web
Offensive-Pentesting-Web PublicA proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bu…
-
Penetration-Testing-Interview-Questions
Penetration-Testing-Interview-Questions PublicCollection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prep…
-
Kali-Linux-Configuration
Kali-Linux-Configuration PublicComprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation t…
Repositories
- Offensive-Pentesting-Scripts Public
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
InfoSecWarrior/Offensive-Pentesting-Scripts’s past year of commit activity - Kali-Linux-Configuration Public
Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
InfoSecWarrior/Kali-Linux-Configuration’s past year of commit activity - Vulnerable-Box-Resources Public
Vulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides detailed insights into the inner workings of your target systems, making it easier to identify potential security gaps, weaknesses, and attack vectors.
InfoSecWarrior/Vulnerable-Box-Resources’s past year of commit activity - Penetration-Testing-Interview-Questions Public
Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prepare for interviews by providing a comprehensive list of questions, answers, and insights into security concepts and practices.
InfoSecWarrior/Penetration-Testing-Interview-Questions’s past year of commit activity - Offensive-Payloads Public
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
InfoSecWarrior/Offensive-Payloads’s past year of commit activity - Offensive-Pentesting-Lab Public
Vulnerable Docker containers designed to simulate vulnerable services for enthusiasts looking to sharpen their skills in identifying, exploiting, and enumerating vulnerabilities in a controlled environment.
InfoSecWarrior/Offensive-Pentesting-Lab’s past year of commit activity - Offensive-Pentesting-Web Public
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
InfoSecWarrior/Offensive-Pentesting-Web’s past year of commit activity - Subdomain-Takeovers Public
This repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and resources to perform subdomain takeover attacks.
InfoSecWarrior/Subdomain-Takeovers’s past year of commit activity
People
This organization has no public members. You must be a member to see who’s a part of this organization.