RUB-NDS / PDF101Links
Artifacts for the Black Hat talk.
☆103Updated 4 years ago
Alternatives and similar repositories for PDF101
Users that are interested in PDF101 are comparing it to the libraries listed below
Sorting:
- A collection of scripts, and tips and tricks for hacking k8s clusters and containers.☆135Updated 8 months ago
- A repository of previous info-sec presentations I've presented.☆161Updated 7 months ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Code Review Audit Script Scanner☆140Updated 2 months ago
- A sample of proof of concept scripts that run Calc.exe with full source code.☆96Updated 9 months ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- Application and Service Fingerprinting☆133Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆78Updated 4 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 4 months ago
- Exploit for Pulse Connect Secure SSL VPN arbitrary file read vulnerability (CVE-2019-11510)☆137Updated 5 years ago
- SNIcat☆126Updated 3 years ago
- Test a host for susceptibility to CVE-2019-19781☆108Updated 4 years ago
- ☆204Updated this week
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆203Updated 2 years ago
- DNS File EXfiltration☆46Updated last year
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated 2 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆251Updated 3 weeks ago
- A CVE Heatmap Using CalPlot☆97Updated 4 years ago
- JIRA Secure Attachment Looter☆70Updated 5 years ago
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- ☆67Updated 6 years ago
- Static Token And Credential Scanner☆96Updated 2 years ago
- ☆22Updated 2 months ago
- JSON RSA to HMAC and None Algorithm Vulnerability POC☆61Updated 5 years ago
- ☆148Updated 3 years ago
- Web-Scale NoSQL Idempotent Cloud-Native Big-Data Serverless Plaintext Credential Search☆186Updated last year