Etisalat-Egypt / Rodan
Rodan Exploitation Framework
☆99Updated 2 years ago
Related projects ⓘ
Alternatives and complementary repositories for Rodan
- Attack Surface Discovery Tool☆105Updated last month
- Generate a bunch of malicious pdf files with phone-home functionality. Can be used with Burp Collaborator☆169Updated 3 years ago
- Proof of Concept exploit scripts and fuzzing templates. Companion blog posts located at https://epi052.gitlab.io/notes-to-self/blog/2020…☆56Updated 4 years ago
- ☆52Updated last year
- ☆75Updated 3 years ago
- Striping CDN IPs from a list of IP Addresses☆74Updated 2 years ago
- A list of threat sinks used in the manual security source code review for application security☆69Updated last year
- ☆121Updated 2 years ago
- Pentest stuff☆49Updated 11 months ago
- HTTP verb tampering & methods enumeration☆51Updated 2 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆47Updated last year
- ☆20Updated 2 years ago
- OSWE Preparation☆37Updated 5 years ago
- Browser extension that extracts users from LinkedIn company pages☆155Updated last year
- ☆162Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 2 years ago
- Damn Vulnerable PHP Application (DVPA) - It is Lab Written in The PHP lang, Which Contains PHP Type Juggling - RCE Challenges☆31Updated 2 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.☆50Updated 4 years ago
- A "Spring4Shell" vulnerability scanner.☆50Updated 2 years ago
- A series of writes about “Binary Exploitation”.☆87Updated last year
- Lookup for interesting stuff in SMB shares☆149Updated last year
- A curated list of bugbounty writeups (Bug type wise) , inspired from https://github.com/ngalongc/bug-bounty-reference☆40Updated 3 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated last year
- Target practice for ffuf☆58Updated 3 years ago
- Upload files done during my research.☆129Updated 2 months ago
- Red Teaming and Penetration Testing Checklist, Cheatsheet, Clickscript☆85Updated last year
- ☆30Updated 4 years ago
- ☆45Updated 6 years ago
- Zed Attack Proxy Scripts for finding CVEs and Secrets.☆126Updated 2 years ago
- Collection Of Reverse Shell that can easily generate using Python3☆57Updated 9 months ago