Adastra-thw / ExploitSerieLinks
Programs used in the Exploitation Tutorial. Check out thehackerway.com
☆20Updated 11 years ago
Alternatives and similar repositories for ExploitSerie
Users that are interested in ExploitSerie are comparing it to the libraries listed below
Sorting:
- Python Library to use the implementation of the REST protocol of Tenable’s Nessus scanner. You can use Nessus from your scripts easily!☆14Updated 10 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆60Updated 5 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆20Updated 8 years ago
- ☆23Updated 7 years ago
- only for 31337☆23Updated 8 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- automato should help with automating some of the user-focused enumeration tasks during an internal penetration test.☆72Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- [DEPRECATED] Kadabra is my automatic LFI Exploiter and Scanner, written in C++ and a couple extern module in Python.☆34Updated 5 years ago
- ☆15Updated 2 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- Cross-Site-Scripting (XSS) Automatic Scanner☆43Updated 4 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆94Updated 4 years ago
- The Adaptive Security Testing Methodology (ASTM) provides context-adjusted testing methodologies based on factors such as time available …☆46Updated 3 years ago
- Fingerprint a web app using local files as the fingerprint sources☆38Updated 8 years ago
- Weape-Wireless-EAP-Extractor☆29Updated 11 years ago
- A collection of CTF solution types, i.e. not solutions to specific CTF challenges, but the general categories that those solutions fall u…☆57Updated 3 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Files for the course Offensive Computer Security 2014 (FSU)☆12Updated 10 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- Pentesting Tools☆22Updated 3 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Bypass XSS Reflected Cross-site scripting☆31Updated 9 years ago
- A collection of Burp Suite extensions☆30Updated 9 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Vulnerable web site. Used to test sentinel features.☆11Updated 8 years ago
- Wmap ("Web Mapper") Information gathering for web hacking.☆14Updated 10 years ago