A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.
☆38Aug 13, 2018Updated 7 years ago
Alternatives and similar repositories for Presentations
Users that are interested in Presentations are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Pulse SSL VPN Arbitrary File Read burp extension☆24Sep 24, 2019Updated 6 years ago
- A monitoring program with sentiment analysis and prioritization.☆13Sep 22, 2018Updated 7 years ago
- Some of my public exploits☆52Sep 15, 2020Updated 5 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- POC for CVE-2018-15685☆42Aug 24, 2018Updated 7 years ago
- ☆21Nov 13, 2019Updated 6 years ago
- Simple SSH server that serves anonymous git repositories (read-only)☆11Oct 18, 2018Updated 7 years ago
- Selenium based bot that automatize the creation of accounts in a web page☆16Nov 2, 2022Updated 3 years ago
- Takeover script extracts CNAME record of all subdomains at once. TakeOver saves researcher time and increase the chance of finding subdom…☆101Apr 7, 2023Updated 2 years ago
- Validate proxies for specific domain☆39Aug 14, 2021Updated 4 years ago
- CVE-2019-0230 Exploit POC☆15Aug 21, 2020Updated 5 years ago
- A list of collected articles and resources from the website Peerlyst☆17Dec 14, 2016Updated 9 years ago
- CVE-2020-11890: Improper input validations in the usergroup table class could lead to a broken ACL configuration to RCE☆63Jun 1, 2023Updated 2 years ago
- Simple, lightweight and compact key logger written for fun ...☆17Sep 12, 2018Updated 7 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- "HeaderScan" Burp Plugin☆16Apr 26, 2014Updated 11 years ago
- Learning Penetration Testing of Android Applications☆80Aug 5, 2017Updated 8 years ago
- XXE injection (file disclosure) exploit for Apache OFBiz < 16.11.04☆13Oct 16, 2018Updated 7 years ago
- Uninvited Guest - A file server for files over DNS TXT records☆22Sep 27, 2024Updated last year
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- Virtual scenario for Network Penetration Testing☆14Mar 19, 2017Updated 9 years ago
- Result files from various fuzzing runs☆16Oct 18, 2021Updated 4 years ago
- CollabOzark is a simple tool which helps the researchers track SSRF, RCE, Blind XSS, XXE, External Resource Access payloads triggers.☆136Sep 25, 2019Updated 6 years ago
- StackStorm pack with action aliases allowing to run Ansible in a ChatOps way☆10Feb 21, 2017Updated 9 years ago
- A simple tool to decloak/expose the bucket name behind a domain.☆22Updated this week
- A list to discover work of red team tooling and methodology for penetration testing and security assessment☆77Mar 8, 2019Updated 7 years ago
- A repo where I explain how to do data story telling☆11Sep 10, 2021Updated 4 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- ☆15Oct 1, 2020Updated 5 years ago
- Pivot into private VPC networks using a VPN connection☆43Oct 8, 2019Updated 6 years ago
- A Mozilla Firefox extension which allows quick access to your google-dorking result☆19Jun 18, 2020Updated 5 years ago
- GitPwnd is a network penetration tool that lets you use a git repo for command and control of compromised machines☆146Feb 2, 2023Updated 3 years ago
- Fast, simple and lightweight micro bot-framework for Python.☆10Oct 22, 2017Updated 8 years ago