003random / loki
☆52Updated last year
Related projects ⓘ
Alternatives and complementary repositories for loki
- SetMyKali is a bash based tool to configure and customize kali linux☆68Updated 2 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 2 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 2 years ago
- Target practice for ffuf☆59Updated 3 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆99Updated 2 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆45Updated 2 years ago
- ☆92Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Attack Surface Discovery Tool☆105Updated 2 months ago
- ☆62Updated 2 years ago
- Striping CDN IPs from a list of IP Addresses☆74Updated 2 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆105Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- ☆72Updated 3 years ago
- A crawler that tests HTML forms for reflection☆47Updated 2 years ago
- Sample Obsidian's vault for web pentesting☆92Updated 3 months ago
- ☆20Updated 2 years ago
- Script that performs a scan of a specific domain, using the following tools: Subfinder, assetfinder, amass and httpx. The result is merge…☆22Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- Sniffcon has a wide list of powerful online bug bounty tools which can be used to find security vulnerabilities.☆38Updated last year
- Simple bash Oneliners to make life easier☆61Updated 4 years ago
- Advanced Reconnaissance and Web Application Discovery☆75Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- Android Pentest Setup Environment☆29Updated 2 years ago
- ☆75Updated 3 years ago
- A wrapper around tools used for subdomain enumeration, to automate the workflow, on a given domain, written in bash.☆75Updated 2 years ago
- Network penetration testing toolset wrapper☆80Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆15Updated last year
- Repository with some necessary information for you to create your PenTest consultancy☆92Updated 2 years ago
- ☆136Updated 3 years ago