003random / lokiLinks
☆52Updated 2 years ago
Alternatives and similar repositories for loki
Users that are interested in loki are comparing it to the libraries listed below
Sorting:
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your o…☆97Updated 2 years ago
- Striping CDN & WAF IPs from a list of IP Addresses☆79Updated last month
- ☆66Updated 3 years ago
- My handbook for Windows Privilege Escalation concepts. Do Check out my Playlist, link: https://www.youtube.com/playlist?list=PLlrnAg4kKF3…☆47Updated 2 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 3 years ago
- A "Spring4Shell" vulnerability scanner.☆49Updated 4 months ago
- ☆94Updated 3 years ago
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆123Updated 2 years ago
- Attack Surface Discovery Tool☆108Updated 8 months ago
- ☆44Updated 3 years ago
- A crawler that tests HTML forms for reflection☆47Updated 3 years ago
- A blazing fast & feature rich Amazon S3 bucket enumerator.☆96Updated 2 years ago
- Advanced Reconnaissance and Web Application Discovery☆81Updated 3 years ago
- ☆68Updated last year
- Intentionally Vulnerable Nodejs Application & APIs☆22Updated 3 years ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆128Updated 11 months ago
- Template used for my OSCP exam.☆28Updated 2 years ago
- ☆38Updated 3 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆128Updated 3 years ago
- A burpsuite extension that helps security researchers find public security reports published on h1 based on the selected host☆42Updated 5 years ago
- ☆60Updated 3 years ago
- Network penetration testing toolset wrapper☆81Updated 2 years ago
- ☆55Updated 2 years ago
- A Buffer Overflow checklist, with plug-and-play pre-written python scripts.☆33Updated 3 years ago
- ☆74Updated 3 years ago
- security.txt collection of most popular world-wide domains☆54Updated last year
- ☆57Updated last year