RUB-NDS / PDF101
Artifacts for the Black Hat talk.
☆102Updated 4 years ago
Related projects ⓘ
Alternatives and complementary repositories for PDF101
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆141Updated last year
- A repository of previous info-sec presentations I've presented.☆156Updated 3 weeks ago
- Whalescan is a vulnerability scanner for Windows containers, which performs several benchmark checks, as well as checking for CVEs/vulner…☆153Updated last year
- Command line fuzzer and bruteforcer 🌪 wfuzz for command☆86Updated 2 years ago
- Burp with Friends☆99Updated last year
- A wordlist that is kept up to date with the latest headlines to provide relevant words to human society☆119Updated 2 years ago
- Search for vulnerabilities and exposures while filtering based on age, keywords, and other parameters.☆124Updated 2 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆123Updated 4 months ago
- Enumerate information from NTLM authentication enabled web endpoints 🔎☆466Updated 4 months ago
- SNIcat☆125Updated 3 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- Bento Toolkit is a minimal fedora-based container for penetration tests and CTF with the sweet addition of GUI applications.☆76Updated 3 years ago
- Run several volatility plugins at the same time☆108Updated 2 years ago
- Mindmaps allow to organize and understand information faster and better.☆2Updated 3 years ago
- Enumerate AD through LDAP with a collection of helpfull scripts being bundled☆140Updated 3 weeks ago
- Static Token And Credential Scanner☆95Updated last year
- ☆64Updated 6 years ago
- A list of files / paths to probe when arbitrary files can be read on a Microsoft Windows operating system☆199Updated last year
- A natural evolution of Burp Suite's Repeater tool☆91Updated last year
- ☆68Updated 3 years ago
- CFPsec is a client program that retrieves the list of Call For Papers or/and upcoming Hacking/Security Conferences based on cfptime.org w…☆55Updated 2 weeks ago
- A highly customised CTF, bounty hunting & penetration testing environment based on the official kali-rolling docker image☆32Updated 7 months ago
- ThreatBox is a standard and controlled Linux based attack platform. I've used a version of this for years. It started as a collection of …☆72Updated this week
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆126Updated last year
- Application and Service Fingerprinting☆131Updated last year
- Find the remote website version based on a git repository☆124Updated 3 years ago
- DNS File EXfiltration☆46Updated 7 months ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 3 years ago
- ☆144Updated 2 years ago