H0j3n / EzpzCheatSheet
☆62Updated 2 years ago
Related projects: ⓘ
- This project demonstrates SPF-bypass techniques utilised by phishers to abuse domains that haven't been secured by DMARC.☆41Updated last year
- ☆61Updated last year
- Collection Of Reverse Shell that can easily generate using Python3☆55Updated 7 months ago
- ☆62Updated 4 months ago
- this script will help you find favicon hashes which you can use to shodan to get more details about an asset☆26Updated 7 months ago
- ☆41Updated last year
- XSS Bypass☆29Updated 7 months ago
- Automatically run and save ffuf scans for multiple IPs☆74Updated 6 months ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆64Updated 6 months ago
- HTTP parameter discovery suite.☆59Updated 4 years ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆65Updated 3 months ago
- ☆32Updated 3 years ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆67Updated 3 months ago
- CLI monitor for windows process- & file activity☆67Updated 3 years ago
- This Repository contains my CRTP cum Red Teaming Active Directory attack and Defence preparation notes.☆24Updated last month
- Offensive Security Web Assessor Resources Repo☆20Updated 10 months ago
- parse nmap files☆137Updated 7 months ago
- ☆25Updated this week
- HTTP verb tampering & methods enumeration☆51Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆38Updated last year
- Spoofcheck☆22Updated this week
- Sample Obsidian's vault for web pentesting☆85Updated last month
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆39Updated 10 months ago
- ☆70Updated 2 months ago
- User enumeration and password spraying tool for testing Azure AD☆67Updated 2 years ago
- Analysis and management tools for an Open Asset Model database☆38Updated this week
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆82Updated last year
- Next generation fireprox AWS API endpoint creation utility.☆41Updated last year
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆69Updated 3 years ago
- Notes for CRTP☆38Updated 3 years ago