L3ster1337 / GPTBypassLinks
☆16Updated 3 months ago
Alternatives and similar repositories for GPTBypass
Users that are interested in GPTBypass are comparing it to the libraries listed below
Sorting:
- ☆19Updated 6 months ago
- ☆44Updated 3 years ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆15Updated last year
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆26Updated 2 weeks ago
- Python Penetration Testing Tools☆17Updated 5 months ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated last year
- Automated HTTP Request Repeating With Burp Suite☆40Updated 2 years ago
- ☆19Updated 4 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- ☆27Updated 2 years ago
- Recon(Amass, Naabu, Nuclei) workflow with Github Actions☆17Updated last year
- Colored Cat is a syntax highlighter file reader.☆15Updated last year
- ☆20Updated 4 years ago
- ☆43Updated 8 months ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆28Updated 8 months ago
- A Project dedicated to documenting various attack and detection vectors that can be encountered within Google Cloud Platform (GCP).☆60Updated last year
- Resources for AD penetration testing and security☆33Updated 3 years ago
- CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect☆29Updated last year
- Random Exploits☆50Updated 2 years ago
- ☆46Updated 2 months ago
- Pipe nmap verbose output to a usable format for httpx or host:port notation.☆17Updated 3 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆27Updated 2 years ago
- S3 bucket enumerator☆30Updated 6 years ago
- ☆27Updated last year
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆29Updated 7 years ago
- A proof-of-concept Command & Control framework that utilizes the powerful AsyncSSH Python library which provides an asynchronous client a…☆75Updated 2 years ago