003random / loki
☆52Updated 2 years ago
Alternatives and similar repositories for loki:
Users that are interested in loki are comparing it to the libraries listed below
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- Striping CDN IPs from a list of IP Addresses☆76Updated 2 years ago
- ☆68Updated last year
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆46Updated 2 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆97Updated 2 years ago
- ☆55Updated 2 years ago
- Advanced Reconnaissance and Web Application Discovery☆79Updated 3 years ago
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 2 months ago
- ☆93Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆127Updated 2 years ago
- Target practice for ffuf☆61Updated 3 years ago
- Simple bash Oneliners to make life easier☆62Updated 4 years ago
- vhost scanning☆34Updated last year
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated last year
- Web Hacking and Red Teaming MindMap☆72Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆32Updated 2 years ago
- ☆20Updated 2 years ago
- ☆56Updated 11 months ago
- Android Pentest Setup Environment☆30Updated 2 years ago
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- This is a Burp Suite extension that allows users to easily add web addresses to the Burp Suite scope.☆97Updated 3 months ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- ☆60Updated 2 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- Information Security Information From Web☆27Updated 7 months ago
- A list of threat sinks used in the manual security source code review for application security☆70Updated last year
- ☆66Updated 3 years ago