JaimePolop / RExpository
☆75Updated 9 months ago
Alternatives and similar repositories for RExpository:
Users that are interested in RExpository are comparing it to the libraries listed below
- ☆55Updated last year
- WhereToGo - is a list of popular services that might be used in organizations. By having an account of the user - you can try to find ent…☆121Updated 2 years ago
- Vulnerable environments paired with ready-to-use Nuclei templates for security testing and learning! 🚀☆84Updated last week
- Blinks is a powerful Burp Suite extension that automates active scanning with Burp Suite Pro and enhances its functionality. With the int…☆115Updated 4 months ago
- ☆54Updated 2 years ago
- ☆81Updated last week
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆93Updated 2 years ago
- ☆72Updated 11 months ago
- CoWitness is a powerful web application testing tool that enhances the accuracy and efficiency of your testing efforts. It allows you to …☆124Updated last year
- ☆139Updated 11 months ago
- Custom scan profiles for use with Burp Suite Pro☆138Updated last year
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆66Updated last year
- A Burp extension to help pentesters copy requests / responses for reports.☆38Updated 3 months ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆39Updated last year
- ☆56Updated 11 months ago
- Everything and anything related to password spraying☆133Updated 10 months ago
- Tool for helping in the exploitation of path traversal vulnerabilities in Java web applications☆29Updated 2 years ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆83Updated last year
- ☆68Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- Verizon Burp Extensions: AI Suite☆124Updated 3 weeks ago
- Filters and highlights Proxy HTTP history for requests with potentially vulnerable parameters☆23Updated last year
- Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆134Updated 4 months ago
- Azure Service Subdomain Enumeration☆57Updated 7 months ago
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 10 months ago
- A quick ‘n dirty nmap parser written in Golang to convert nmap xml to IP:Port notation.☆127Updated 9 months ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆66Updated last year
- ☆31Updated last year
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 5 months ago
- CSPTPlayground is an open-source playground to find and exploit Client-Side Path Traversal (CSPT).☆114Updated 2 weeks ago