Orange-Cyberdefense / sqltreesLinks
Developper-proof prevention of SQL injection (java library)
☆11Updated 4 years ago
Alternatives and similar repositories for sqltrees
Users that are interested in sqltrees are comparing it to the libraries listed below
Sorting:
- Create an AMI with CobaltStrike and related tools.☆10Updated this week
- A Burp extension for generic extraction and reuse of data within HTTP requests and responses.☆8Updated 3 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆10Updated 9 months ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 6 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- A fast port scanner written in go with a focus on reliability and simplicity.☆16Updated 8 months ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Abusing Cloudflare Workers to establish persistence and exfiltrate sensitive data at the edge.☆16Updated 2 years ago
- This script will pull and analyze syscalls in given application(s) allowing for easier security research purposes☆21Updated 4 years ago
- Python support package to parse IP and host inputs from network based tooling☆12Updated last year
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Docker container for running OWASP WebGoat.NET application☆11Updated 7 years ago
- ☆18Updated 6 months ago
- Real-time updated lists of U.S. GovCloud IP ranges on Amazon AWS, Microsoft Azure, Google GCP☆18Updated 6 months ago
- Log4Shell IOCs from CERT Orange Cyberdefense Threat Intelligence Datalake☆18Updated 2 years ago
- Modular C2 server to tame your pack of wolves☆12Updated last month
- A collection of personal ZAP scripts☆14Updated 2 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Automated Persistence and Lateral Movement using GCP Patch Management☆15Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Cisco CallManager User Enumeration☆15Updated 2 years ago
- Malware campaigns and APTs research by BlackArrow☆18Updated 5 years ago
- Ease and assist the compromise of an Active Directory environment.☆29Updated 3 years ago
- My nim learning experiments☆11Updated 2 years ago
- Deploy multiple instances of Nessus in docker containers easily☆20Updated 4 years ago