003random / lokiLinks
☆52Updated 2 years ago
Alternatives and similar repositories for loki
Users that are interested in loki are comparing it to the libraries listed below
Sorting:
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- This could have been a bash one-liner but guess what. It's a small Go tool that lists the trending CVEs from cvetrends.com☆106Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆51Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆57Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆77Updated this week
- Offensive Security MISC Annotations and Payloads for Ethical Hackers / Security Researchers☆29Updated 7 months ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆97Updated 3 years ago
- Multi-threaded URL enumeration/content-discovery tool in Python.☆107Updated last year
- Fetch data (open ports, CVEs, CPEs, ...) from shodan internetDB API☆92Updated 2 years ago
- OSCP Study Guide☆40Updated 2 years ago
- Do It Yourself! (DIY) Web Penetration Testing is a guideline in performing security test cases against web applications☆39Updated 2 years ago
- ☆43Updated 3 months ago
- ☆46Updated 4 years ago
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆170Updated 3 years ago
- A collection of red blue team staff☆46Updated 2 years ago
- ☆76Updated 4 years ago
- Attack Surface Discovery Tool☆108Updated 10 months ago
- ☆56Updated 2 years ago
- ☆48Updated 4 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 5 years ago
- Streamline your recon and vulnerability detection process with SCRIPTKIDDI3, A recon and initial vulnerability detection tool built using…☆151Updated last year
- ☆68Updated 2 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 3 years ago
- A curated list wordlists for bruteforcing and fuzzing☆83Updated 2 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 7 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- ☆21Updated 2 years ago
- Rodan Exploitation Framework☆100Updated 3 years ago