Perfectdotexe / WordPress-Plugins-List
Wordpress Plugins List
☆13Updated 5 years ago
Related projects: ⓘ
- Seatbelt is a C# project that performs a number of security oriented host-survey "safety checks" relevant from both offensive and defensi…☆11Updated 4 years ago
- ☆10Updated this week
- Exfiltrate data with DNS queries. Based on CertUtil and NSLookup.☆19Updated 8 months ago
- Python driver for Wappalyzer, a web application detection utility.☆9Updated 4 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- Standardizing Security Titles☆13Updated last year
- miscellaneous sploit scripts/hacks☆13Updated 2 months ago
- Sp00fer blog post -☆25Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆21Updated 3 years ago
- Exchange your privileges for Domain Admin privs by abusing Exchange☆15Updated 4 years ago
- ☆14Updated 7 months ago
- Computer Network Exploitation (CNE) Field Manual☆13Updated 5 months ago
- A collection of curated Java Deserialization Exploits☆9Updated 6 years ago
- Phishing sites configured to work with Netlify form handling☆12Updated 5 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆9Updated 3 years ago
- pwncat windows c2 components☆17Updated 3 years ago
- Information Repository on Various Methods of getting shell access into a Windows machine☆16Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆21Updated 5 years ago
- A lightweight Python 3 Nmap wrapper that doesn't try too hard. Gracefully handles any Nmap command, providing access to all output types …☆12Updated 2 years ago
- Slap the hell outta GitHub by harvesting emails by crunching through commits. The Dope OSINT tool.☆13Updated 6 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆15Updated 4 years ago
- Golang C2 Agent PoC utilizing web and social media paltforms to issue command and control and pasting results to PasteBin☆14Updated 4 years ago
- Standalone man-in-the-middle attack framework used for phishing login credentials along with session cookies, allowing for the bypass of …☆13Updated 5 months ago
- A playground to practice SSRF Attacks against web apps☆17Updated 5 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆35Updated 6 years ago
- Scripts for: How to Build a Covert Pentesting Infrastructure Almost Free☆21Updated 5 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Updated 6 years ago
- automated penetration toolkit☆12Updated 8 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- List of domains having RVDP programmes☆10Updated 4 years ago