Orange-Cyberdefense / sqltreesLinks
Developper-proof prevention of SQL injection (java library)
☆11Updated 4 years ago
Alternatives and similar repositories for sqltrees
Users that are interested in sqltrees are comparing it to the libraries listed below
Sorting:
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Generate representative samples from Pwned Passwords (HIBP)☆13Updated 3 years ago
- all published scripts devloped by ahmed khlief☆20Updated 5 years ago
- Create an AMI with CobaltStrike and related tools.☆10Updated last week
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- ☆42Updated 3 months ago
- Some Pentesting Scripts☆11Updated 3 years ago
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- A wrapper script for https://sploitus.com to scrape query results for tools and exploits☆15Updated 6 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- Security and Privacy Failures in Popular 2FA Apps☆19Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- A port scanner written in PowerShell☆13Updated 4 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- A library to enhance and speed up script/exploit writing for CTF players☆40Updated 5 years ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- Log4j-Scanner with Bind-Receipt and custom hostnames☆18Updated 3 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago
- Advisories and Proofs of Concept by BlackArrow☆19Updated 6 months ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Invoke-SocksProxy is a PowerShell script designed to create reverse proxies.☆49Updated 4 years ago
- A PowerShell script that checks for dangerous ACLs on system hives and shadows☆28Updated 3 years ago
- module for certexfil☆15Updated 3 years ago
- All about CVE-2022-30190, aka follina, that is a RCE vulnerability that affects Microsoft Support Diagnostic Tools (MSDT) on Office apps …☆24Updated 2 years ago
- With the help of this docker image, you can easily access PEzor on your system!☆15Updated 3 years ago
- Send message on Telegram when you get a new Cobalt Strike beacon☆21Updated 5 years ago