Pentest-Command
☆20Nov 10, 2021Updated 4 years ago
Alternatives and similar repositories for Pentest-Command
Users that are interested in Pentest-Command are comparing it to the libraries listed below
Sorting:
- Collection of penetration testing tools☆82Dec 17, 2020Updated 5 years ago
- check if the source code compressed and uploaded to the server by mistake☆10Feb 21, 2022Updated 4 years ago
- Welcome! This repo is a conglomeration of tips, tricks, tools, and data analysis to use while doing web application security assessments,…☆14Jan 13, 2019Updated 7 years ago
- 🎯 SQL Injection Payload List☆10Jun 6, 2021Updated 4 years ago
- Intranet penetration tools☆880Nov 17, 2021Updated 4 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- An exhaustive list of all the possible ways you can chain your Blind SSRF vulnerability☆17Jan 31, 2021Updated 5 years ago
- A Simple Log4j Indicator of Compromise Linux Detector☆17Dec 15, 2021Updated 4 years ago
- Automated blind-xss search for Burp Suite☆22Mar 28, 2022Updated 3 years ago
- Springboot detection☆23Nov 8, 2021Updated 4 years ago
- Cobalt Strike二次开发笔记,记录功能和思路☆16Jul 9, 2022Updated 3 years ago
- EBot - 棱角社区攻防日报企业微信机器人☆17Nov 24, 2021Updated 4 years ago
- POC of CVE-2021-2394☆21Aug 2, 2021Updated 4 years ago
- 获取棱角社区攻防日报内容进行日报推送☆21Oct 26, 2021Updated 4 years ago
- ☆32Aug 15, 2022Updated 3 years ago
- 就是一个练习Java反序列化的最简单环境☆15Dec 24, 2021Updated 4 years ago
- A list of resources for those interested in getting started in bug bounties☆13Jun 18, 2020Updated 5 years ago
- ☆174Oct 26, 2025Updated 4 months ago
- ☆12Jun 16, 2021Updated 4 years ago
- Demo of the URLClassLoader JAR-swapping showing the ability to replace and exploit an already loaded JAR with inner classes☆32Dec 10, 2022Updated 3 years ago
- Apache Dubbo Hessian2 CVE-2021-43297 demo☆46Jan 18, 2022Updated 4 years ago
- A Burp Suite extension to extract datas from source code while browsing.☆161Mar 20, 2024Updated 2 years ago
- ☆27Jan 25, 2020Updated 6 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 5 years ago
- ☆20Jul 19, 2021Updated 4 years ago
- Check the default pwd of product via checklist.☆18Nov 1, 2021Updated 4 years ago
- A curated list of CTF frameworks, libraries, resources and softwares☆10Nov 11, 2015Updated 10 years ago
- ShoLister is a tool that collects all available subdomains for specific hostname or organization from Shodan. The tool is designed to be …☆13May 10, 2022Updated 3 years ago
- 就是一个练习RMI反序列化的最简单环境☆30Jan 8, 2022Updated 4 years ago
- goverview - Get an overview of the list of URLs☆142Dec 5, 2025Updated 3 months ago
- Some contributions in the nuclei-templates repository☆62Jun 18, 2022Updated 3 years ago
- ☆10Jan 25, 2023Updated 3 years ago
- Apache-backdoor Apache 中间件模块后门☆53Jan 10, 2020Updated 6 years ago
- 根据github上的源码改的一些工具。用友nc解密、......☆18Jan 26, 2022Updated 4 years ago
- Red Team Tools for Emulated Adversary Techniques with MITRE ATT&CK☆31Sep 21, 2020Updated 5 years ago
- ☆535Jul 16, 2021Updated 4 years ago
- awesome resources about cloud security 🐿☆20Dec 2, 2021Updated 4 years ago
- Hello, Attack Surface Scan, BurpSuite完全被动扫描插件,不主动发送任何请求,适合挂机使用。☆24Jul 10, 2022Updated 3 years ago
- A Complete SSRF (Server Side Request Forgery) Scanner.☆40Dec 1, 2025Updated 3 months ago