RUB-NDS / PDF101
Artifacts for the Black Hat talk.
☆103Updated 4 years ago
Alternatives and similar repositories for PDF101:
Users that are interested in PDF101 are comparing it to the libraries listed below
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆142Updated last year
- A repository of previous info-sec presentations I've presented.☆161Updated 5 months ago
- Words list generator to crack security tokens☆110Updated 4 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆210Updated 4 years ago
- ncurses-grep: interactively navigate grep-like results☆32Updated last year
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆77Updated 4 years ago
- ☆148Updated 3 years ago
- Vulnerable thick client applications used as examples in the Introduction to Hacking Desktop Applications blog series☆102Updated last year
- Code Review Audit Script Scanner☆140Updated last year
- Scan DockerHub images that match a keyword to find secrets.☆57Updated 4 years ago
- A natural evolution of Burp Suite's Repeater tool☆92Updated last year
- Find the remote website version based on a git repository☆126Updated 3 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Burp with Friends☆103Updated 2 years ago
- Mailpl0it is a small utility that hunts the homepage of exploit-db looking for user supplied quer(y/ies) and notifies the user via email …☆31Updated 2 years ago
- Test a host for susceptibility to CVE-2019-19781☆108Updated 4 years ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆249Updated last month
- ☆114Updated last year
- Tools to assess the DNS security of web applications☆128Updated 2 years ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 2 months ago
- Extensive code infrastructure for finding unintended information leaks in files, git repositories and much more.☆28Updated 2 years ago
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 3 years ago
- HoneyCreds network credential injection to detect responder and other network poisoners.☆217Updated 3 years ago
- SNIcat☆126Updated 3 years ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆155Updated last year
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆202Updated last year
- Burp Automator - A Burp Suite Automation Tool. It provides a high level CLI and Python interfaces to Burp Suite scanner and can be used t…☆197Updated last year
- Resources for our Active Directory security workshops☆140Updated 3 years ago
- ☆67Updated 6 years ago
- DNS File EXfiltration☆46Updated last year