H0j3n / EzpzSharepointLinks
☆26Updated 3 years ago
Alternatives and similar repositories for EzpzSharepoint
Users that are interested in EzpzSharepoint are comparing it to the libraries listed below
Sorting:
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆51Updated last year
- A repository of tools developed while studying for OSEP. The contents here are not part of courseware but some tools, i wrote as an exten…☆2Updated last year
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆125Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆109Updated 2 months ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆42Updated last month
- ☆38Updated 2 years ago
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆77Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆98Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆95Updated last year
- Burp Suite Extension for inserting a magic byte into responder's request☆25Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆20Updated last year
- Tool to enable blind sql injection attacks against websockets using sqlmap☆64Updated 3 months ago
- A python3 script searching for secret on swaggerhub☆68Updated 3 years ago
- Repository with quick triggers to help during Pentest in an Active Directory environment.☆44Updated 2 weeks ago
- ☆56Updated 2 years ago
- NotSoCereal: A Deserialization exploit playground☆53Updated 3 years ago
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆84Updated 2 years ago
- Spoofcheck☆39Updated 2 months ago
- ☆92Updated 2 years ago
- A Python based ingestor for BloodHound☆84Updated 2 years ago
- Azure Service Subdomain Enumeration☆64Updated 11 months ago
- ☆45Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- ☆141Updated last year
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆47Updated 2 years ago
- Notes for CRTP☆41Updated 4 years ago
- A tool for quickly evaluating IAM permissions in AWS.☆57Updated last year