Adastra-thw / ExploitSerie
Programs used in the Exploitation Tutorial. Check out thehackerway.com
☆19Updated 10 years ago
Related projects ⓘ
Alternatives and complementary repositories for ExploitSerie
- Quick scan to find live hosts on the network/across networks☆48Updated 10 years ago
- Script to automate, manage, and multithread Nikto scans.☆58Updated 4 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Fingerprint a web app using local files as the fingerprint sources☆36Updated 7 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- A suite of CLI tools I built to automate some of the tedious parts of exploit development (specifically, crafting Buffer Overflow Exploit…☆38Updated 8 years ago
- This is an automated tool collection written in Python for vulnerability assessment and exploitation. It also includes solution of SPSE -…☆20Updated 7 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 8 years ago
- ☆21Updated 7 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- Vulnerable software and exploits used for OSCP/OSCE preparation☆24Updated 7 years ago
- Metasploit Framework with Viproy installed.☆36Updated 7 years ago
- Vulnerability Assessment and Penetration Testing Toolkit☆18Updated 2 years ago
- McAfee ePolicy 0wner exploit code☆46Updated 6 years ago
- Create lists from nmap output.☆13Updated 3 years ago
- Random collection of exploit code, tools, scripts, etc.☆25Updated 9 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- ☆62Updated 12 years ago
- Collection of tools for privesc on Linux☆33Updated 11 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 8 years ago