RUB-NDS / PDF101Links
Artifacts for the Black Hat talk.
☆105Updated 5 years ago
Alternatives and similar repositories for PDF101
Users that are interested in PDF101 are comparing it to the libraries listed below
Sorting:
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated 2 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- SNIcat☆127Updated 3 years ago
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 9 months ago
- List of Repositories☆98Updated 3 years ago
- ☆208Updated last month
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- d(ockerp)wn - a docker pwn tool manager☆157Updated 4 years ago
- LLMNR/NBNS/mDNS Spoofing Detection Toolkit☆60Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆187Updated last year
- Powerglot encodes offensive powershell scripts using polyglots . Offensive security tool useful for stego-malware, privilege escalation, …☆175Updated 5 years ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆75Updated 8 months ago
- nse script to inject jndi payloads☆46Updated 3 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 3 years ago
- Password Breach API Server☆87Updated last month
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 5 months ago
- Machine-learn password mangling rules☆113Updated last year
- Stealthy data exfiltration via IPv6 covert channel☆102Updated 6 years ago
- Tools for investigating Log4j CVE-2021-44228☆95Updated 3 years ago
- My very personal and opinionatedly organized infosec/cybersec sources in one OPML file☆57Updated 2 years ago
- Tool to identify routers on the local LAN and paths to the Internet☆66Updated last year
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- ☆69Updated 3 years ago
- Burp with Friends☆103Updated 2 years ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- ☆36Updated 5 years ago
- Posts about different topics☆36Updated last year
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago