Skip to content

xhref/Penetration-List

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Penetration-List

Penetration-List

Share the Exciting Hacking Material

About Penetration-list

The Penetration List is a comprehensive resource designed to supplement the work of testers. It contains a comprehensive array of vulnerabilities and materials utilized in Penetration Testing, covering diverse areas such as web applications, network testing, and Android penetration testing. This comprehensive list includes payloads, dorks, fuzzing materials, bypass payloads, and various other components necessary for successful penetration testing. Additionally, we provide in-depth theoretical sections, delving into the intricacies of each vulnerability found in medium-sized applications. Our objective is to create a singular, all-encompassing list that incorporates materials pertinent to web applications, network testing, Android Penetration Testing, and more.

Linkedin Medium Website

Installation Steps

Git

   git clone https://github.com/AlbusSec/Penetration-List
   cd Penetration-List

License & copyright

📜 License: The Penetration-List, created by Albus Security, is governed by the MIT License. This license grants users the rights to access, use, and modify the materials provided in the Penetration-List for the purpose of enhancing their penetration testing skills and knowledge in the field of cybersecurity. By accessing and utilizing these resources, users agree to comply with the terms and conditions set forth in the chosen license. For further details, please refer to the license documentation included in the repository.

💬 Cybersecurity Community & Discussion Hub!

Are you looking to join a friendly and welcoming community of individuals who share a passion for Cyber Security? If you have a strong knowledge of this field, we invite you to be a part of our group! Here, you'll have the opportunity to participate in decision-making, ask questions, and showcase your skills by sharing your security projects with experienced and supportive security engineers. Join us today and let's grow together in the exciting world of Cyber Security.

For practical and theoretical knowledge about vulnerabilities, make sure to explore the Penetration-List Theory on Medium, which provides comprehensive insights. [Link mentioned above⬆️]

About

No description, website, or topics provided.

Resources

Stars

Watchers

Forks

Packages

No packages published