☆17Sep 24, 2022Updated 3 years ago
Alternatives and similar repositories for web-app-exploitation
Users that are interested in web-app-exploitation are comparing it to the libraries listed below
Sorting:
- ☆14Feb 4, 2024Updated 2 years ago
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆21Apr 14, 2021Updated 4 years ago
- Mannu Shell is PHP web based shell. This code is meant for performing server side file manipulation and other stuffs. Its backdoor free a…☆17Jun 27, 2018Updated 7 years ago
- Active DIrectory Lab for Pentesting Practice☆24Aug 9, 2022Updated 3 years ago
- ☆27Jul 29, 2024Updated last year
- Materials from different CTFs for later reuse☆27Mar 23, 2023Updated 2 years ago
- ☆33Oct 12, 2022Updated 3 years ago
- ☆10Jul 21, 2021Updated 4 years ago
- Web for Pentester I☆11Sep 21, 2018Updated 7 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Feb 11, 2020Updated 6 years ago
- Penetration Testing with Golang☆43Jul 14, 2023Updated 2 years ago
- Quick Command Cheatsheet, you can import/open directly to you ONE NOTE.☆10Feb 27, 2026Updated last week
- ☆10Jun 13, 2024Updated last year
- Shell Scripting with Bash, by EC-Council☆11Jun 4, 2021Updated 4 years ago
- ☆13Feb 26, 2021Updated 5 years ago
- Sample SecOps scripts and Utilities☆12Jun 19, 2024Updated last year
- ☆11Dec 5, 2020Updated 5 years ago
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Get top quality resources from this repo. (Beginner Specific)☆13Jul 18, 2023Updated 2 years ago
- RSMP Signal Exchange List (SXL) for Traffic Controllers☆12Dec 19, 2025Updated 2 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago
- GUI tool which enables you to parse nessus scan files from Tenable Nessus and Tenable Security Center, and exports results to a spreadshe…☆110Jan 23, 2026Updated last month
- ☆46Nov 5, 2025Updated 4 months ago
- HoneyDB Python Module☆14Feb 6, 2024Updated 2 years ago
- ☆48Apr 15, 2022Updated 3 years ago
- Experimental python3.x based ICMP bind shell listener using scapy and windows 'compatible'☆10May 29, 2020Updated 5 years ago
- Solidity CTF challenge from BSides TLV 2022☆14Jul 8, 2022Updated 3 years ago
- Just an automation script to delete/unsend fb messages. Inspired from: @pishangujeniya/instagram-helper☆10Jul 31, 2022Updated 3 years ago
- My eJPT exam cheatSheet☆12Nov 9, 2021Updated 4 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆16Jan 13, 2022Updated 4 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- ☆10May 1, 2020Updated 5 years ago
- Visualizing Path Finding using A* algorithm☆14Nov 7, 2022Updated 3 years ago
- Aruba Instant (IAP) - Remote Code Execution Exploit☆10Jul 30, 2021Updated 4 years ago
- Jupyter Notebooks for Digital Forensics & Incident Response☆10Nov 23, 2021Updated 4 years ago
- A small pentesting lab for Azure☆10Apr 19, 2019Updated 6 years ago
- Browser History Histogram -- module for the Autopsy Forensic Browser☆11Sep 15, 2019Updated 6 years ago
- Prototype-Pollution-Lab to chain the vulnerabilities between multiple accounts.☆13Sep 11, 2021Updated 4 years ago