Adastra-thw / ExploitSerie
Programs used in the Exploitation Tutorial. Check out thehackerway.com
☆19Updated 10 years ago
Alternatives and similar repositories for ExploitSerie:
Users that are interested in ExploitSerie are comparing it to the libraries listed below
- Quick scan to find live hosts on the network/across networks☆47Updated 10 years ago
- Flunym0us is a Vulnerability Scanner for Wordpress and Moodle designed by Flu Project Team. Flunym0us has been developed in Python. Flun…☆28Updated 8 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Script to automate, manage, and multithread Nikto scans.☆57Updated 4 years ago
- A ready to deploy docker container for a fresh sandbox for on-the-fly malware analysis☆43Updated 7 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- SQL SERVER Exploitation.☆27Updated 7 years ago
- A small collection of Burp Suite extensions, written in Python☆10Updated 8 years ago
- Suite for Information gathering☆12Updated 6 years ago
- Weape-Wireless-EAP-Extractor☆26Updated 11 years ago
- XSSYA (Cross Site Scripting Scanner & Vulnerability Confirmation)☆95Updated 2 years ago
- IRC bot for cracking hashes☆18Updated 3 years ago
- WAFW00F allows one to identify and fingerprint Web Application Firewall (WAF) products protecting a website.☆8Updated 5 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Version Releases of Splinter the RAT @Carpenter1010☆32Updated 10 years ago
- Creates the initial scope of files and directories/folders of a web site for Spiders/Robots/Crawlers☆16Updated 11 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 7 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 6 years ago
- Data exfiltration PoC scripts☆23Updated 9 years ago
- Self contained htaccess shells and attacks☆14Updated 6 years ago
- Scripts, tools, and proof-of-concepts to aid in a penetration test.☆95Updated 4 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- Plugins for the Serpico Project☆22Updated 6 years ago
- A Jenkins Pentest/Security Toolkit written in Python☆15Updated 7 years ago
- ☆21Updated 7 years ago