Infosec Warrior
InfoSecWarrior
Languages
Repos
25
Stars
937
Forks
538
Top Language
PowerShell
Loading contributions...
Top Repositories
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prepare for interviews by providing a comprehensive list of questions, answers, and insights into security concepts and practices.
Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
Repositories
25Vulnerable Docker containers designed to simulate vulnerable services for enthusiasts looking to sharpen their skills in identifying, exploiting, and enumerating vulnerabilities in a controlled environment.
List of payloads and wordlists that are specifically crafted to identify and exploit vulnerabilities in target web applications.
Covering fundamental Linux concepts, from basic commands to advanced topics like string processing, file management, user and group management, networking, process control, firewall configuration, task scheduling, and more.
Offensive Nmap guide for penetration testers and red teamers. Includes practical examples, evasion techniques, and advanced usage for network reconnaissance and stealth scanning.
No description provided.
Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient commands for your pentesting / red-teaming engagements, OSCP and CTFs.
Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work more efficient and effective.
Comprehensive guide to configuring Kali Linux, a Debian-based Linux distribution designed for penetration testers. The guide covers everything from repository setup and NVIDIA driver installation to Python configuration and essential tool installation, ensuring an optimized setup for penetration testing tasks.
Collection of Penetration Testing Interview Questions across various domains, including Information Security, Network Security, Web Security and API Security. This repository helps enthusiasts prepare for interviews by providing a comprehensive list of questions, answers, and insights into security concepts and practices.
A proper approach to pentest a Web application with the mixture of all useful payloads and complete testing guidance of attacks. Designed as a quick reference cheat sheet for your pentesting and bug bounty engagement.
Passive Reconnaissance Techniques Approach helps for penetration testing and bug bounty hunting by gathering information about a target system or network.
No description provided.
Vulnerable Box Resources is a curated collection of scan outputs and data designed to help you analyze and exploit vulnerable machines. This repository provides detailed insights into the inner workings of your target systems, making it easier to identify potential security gaps, weaknesses, and attack vectors.
No description provided.
This repository discusses the subdomain takeover vulnerability and lists of services which are vulnerable to it. It also provides information, methodology and resources to perform subdomain takeover attacks.
Computer Networking Essentials is a beginner-friendly resource covering fundamental networking concepts and system basics.
No description provided.
No description provided.
Guides for installing, configuring, and managing various Linux-based server services. It covers both foundational and advanced topics related to server administration, making it a valuable resource for sysadmins working with Linux servers.
Linux Server Administrator Exam Report
Collection of file transfer techniques for both Linux and Windows environments. It covers protocols and tools to help transfer files locally, remotely, and cross-platform, making it a handy resource for system administrators, penetration testers.
No description provided.
No description provided.
No description provided.
No description provided.