003random / lokiLinks
☆51Updated 2 years ago
Alternatives and similar repositories for loki
Users that are interested in loki are comparing it to the libraries listed below
Sorting:
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆129Updated 3 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 3 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆107Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated last year
- ☆67Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆19Updated 2 months ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆56Updated 3 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated 2 years ago
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆30Updated last year
- ☆43Updated 9 months ago
- A collection of red blue team staff☆48Updated 2 years ago
- A Bug Bounty Platform that allows hunters to issue commands over a geo-distributed cluster. The ideal user is someone who is attempting t…☆49Updated last year
- MayorSec DNS Enumeration Tool☆89Updated last year
- Just another vulnerable web application.☆36Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆128Updated 3 years ago
- Rodan Exploitation Framework☆103Updated 2 months ago
- An automated, reliable scanner for the Log4Shell (CVE-2021-44228) vulnerability.☆45Updated last year
- ☆27Updated 2 years ago
- Information Security Information From Web☆28Updated 6 months ago
- Collection Of Reverse Shell that can easily generate using Python3☆59Updated 2 years ago
- Attack Surface Discovery Tool☆110Updated last year
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆33Updated 3 years ago
- Upload files done during my research.☆169Updated last month
- Striping CDN & WAF IPs from a list of IP Addresses☆81Updated 9 months ago
- Handy scripts and one-liners to make life easier☆36Updated 2 years ago
- ☆38Updated 4 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago