0xyassine / poc-seeker
automated tool designed to streamline the search and identification of Proofs of Concept (POCs)
☆13Updated 9 months ago
Alternatives and similar repositories for poc-seeker:
Users that are interested in poc-seeker are comparing it to the libraries listed below
- This repository has workflows created for https://github.com/RikunjSindhwad/Task-Ninja☆23Updated 5 months ago
- OSCP_OSWA_OSED_OSEP_OSWE☆7Updated last year
- King of Bug Bounty Tips Simple Tool☆12Updated 3 years ago
- ☆17Updated last year
- ☆23Updated 5 years ago
- Automate Auxiliary Module in Metasploit☆20Updated 3 years ago
- Pentesting notes☆17Updated last year
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- F5 BIG-IP Scanner scans for servers on shodan and checks to see if they are vulnerable.☆17Updated last year
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆14Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆35Updated last year
- A tool that automates the trevorc2 powershell agent obfuscation process with the pyfuscation tool☆15Updated last year
- ☆20Updated 3 years ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Template used for my OSCP exam.☆26Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆34Updated last year
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Bash script for CTF automating basic enumeration☆46Updated 2 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆13Updated last year
- Template Nuclei SSTI☆29Updated last year
- your bestfried for finding LinkedIn Employees on github☆16Updated last year
- ☆12Updated 3 years ago
- Bash script to generate reverse shell payloads☆20Updated last year
- ParamChanger is a tool allowing you to replace the parameters of a list of urls by a payload entered as an argument☆13Updated 2 years ago
- ☆15Updated last year
- Noob Penetration tester☆11Updated 8 months ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆11Updated last year
- nistrich allows you to discover CVEs and their severities belong to IP addresses☆13Updated 2 years ago
- ☆27Updated last year
- Simple recon tool automates your recon process☆16Updated last year