Orange-Cyberdefense / sqltrees
Developper-proof prevention of SQL injection (java library)
☆11Updated 4 years ago
Alternatives and similar repositories for sqltrees:
Users that are interested in sqltrees are comparing it to the libraries listed below
- Create an AMI with CobaltStrike and related tools.☆10Updated 3 weeks ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last week
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- module for certexfil☆15Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- Monitor malware scanning services for your payloads☆10Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Random Tips and Writeups.☆13Updated 6 years ago
- ☆18Updated 5 months ago
- Proof of concept exploit for Ivanti EPM CVE-2024-13159 and others☆11Updated 2 months ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 6 years ago
- Slides from my talk at the Adversary Village, Defcon 30☆29Updated 2 years ago
- Windows File Enumeration Intel Gathering Tool.☆17Updated last year
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- My nim learning experiments☆11Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- ☆18Updated last year
- A port scanner written in PowerShell☆13Updated 4 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 3 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- ☆12Updated 2 years ago
- Strategy for building a Red Team☆17Updated last year
- Remove Offensive and Profane Words from Wordlists☆14Updated last year
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago