ProfessionallyEvil / client-side-attacks-labLinks
Lab Environment for learning client-side attacks such as CSRF, Clickjacking, XSS, and CORS abuse.
☆20Updated 2 years ago
Alternatives and similar repositories for client-side-attacks-lab
Users that are interested in client-side-attacks-lab are comparing it to the libraries listed below
Sorting:
- Privescker - make life easier by dumping all your common Windows enum, privesc and post exploitation scripts and tools on to the box in o…☆46Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 5 years ago
- Script to parse multiple Nmap .gnmap exports into various plain-text formats for easy analysis.☆24Updated 11 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- Skills To Improve Before Heading to OSCP☆15Updated 8 years ago
- Data exfiltration utility for testing detection capabilities☆57Updated 3 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆15Updated 8 years ago
- Report and finding templates used by the Serpico reporting tool☆16Updated 6 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- automatic scan for hackthebox☆13Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Noob Penetration tester☆11Updated last year
- Small python script wrapper for automating hashcat commands☆38Updated 4 years ago
- This contains common OSCP local exploits and enumeration scripts☆11Updated 9 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 7 months ago
- Extract credentials from lsass remotely☆16Updated 5 years ago
- ☆16Updated 7 years ago
- ☆33Updated 5 months ago
- Parses Nessus .nessus files for exploitable vulnerabilities and outputs a report file in format MM-DD-YYYY-nessus.csv☆39Updated last year
- Penetration Testing with Kali Linux☆22Updated 5 years ago
- Privilege escalation challenges created for Harmonie-Technologie exhibition stand @ NDH16 (Paris)☆14Updated 5 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆38Updated 5 years ago
- CloudScraper: Tool to enumerate targets in search of cloud resources. S3 Buckets, Azure Blobs, Digital Ocean Storage Space.☆12Updated 6 years ago
- Notes and helper scripts/files/etc from when I passed my OSCP☆20Updated 5 years ago
- Collection of scripts and tools that I created to aid in my testing.☆14Updated 3 years ago
- My Python Cookiecutter project template☆32Updated 2 years ago
- Just a place to share some things I've written while participating in Hack The Box.☆19Updated 5 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 6 years ago