L3ster1337 / GPTBypassLinks
☆16Updated 2 years ago
Alternatives and similar repositories for GPTBypass
Users that are interested in GPTBypass are comparing it to the libraries listed below
Sorting:
- ☆20Updated 4 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 9 months ago
- AWS Trail Recon is an idea that came up during gohacking's offensive AWS security training. The idea is to use cloudtrail:lookupevents to…☆14Updated last year
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- Open-Source Phishing Toolkit☆19Updated 4 years ago
- Compilation of scripts/tools (made by me or not) that help me with Pentest and Bug Bounty.☆27Updated 10 months ago
- 😭 WSOB is a python tool created to exploit the new vulnerability on WSO2 assigned as CVE-2022-29464.☆26Updated 2 years ago
- ☆28Updated last year
- ☆43Updated 4 months ago
- Python Penetration Testing Tools☆17Updated 2 months ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- ☆38Updated last year
- ☆19Updated 3 months ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated 7 months ago
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- After getting heavy demand on my Crest CPSA. I am sharing my notes on Network Security Assessment from recommended book for CPSA. Please …☆14Updated 2 years ago
- Random Exploits☆50Updated 2 years ago
- ☆45Updated 2 years ago
- Pentester Academy notes and commands from the CRTP/CRTE/PACES courses☆14Updated 3 years ago
- ☆45Updated 2 years ago
- ☆25Updated 2 years ago
- ☆15Updated 11 months ago
- This Python tool enables network node command and exfiltration while applying OPSEC to ensure the process is hidden by transmitting comma…☆34Updated last year
- Script for Bug Bounty☆29Updated 4 years ago
- Resources for AD penetration testing and security☆32Updated 3 years ago
- ☆27Updated 2 years ago
- Tools used for Pentesting☆22Updated 2 years ago