ZephrFish / Blog_Backup
A repository with various tutorials on how to do things in Pentesting, setup environments and other things
☆20Updated 7 years ago
Alternatives and similar repositories for Blog_Backup:
Users that are interested in Blog_Backup are comparing it to the libraries listed below
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 7 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- ☆47Updated 9 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- Short and simple vulnerable PHP web application that naïve scanners found to be perfectly safe☆14Updated 9 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 7 years ago
- Collection of tools for privesc on Linux☆33Updated 11 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Stay on top of new domains! Bug bounty hunters can use this tool to receive Pushbullet notifications each time there is a new target subd…☆25Updated 6 years ago
- ~ BannerGrab☆26Updated 8 years ago
- PHDAYS |||☆17Updated 11 years ago
- Web shells for use in penetration testing☆39Updated 9 years ago
- Highlight Burp proxy requests made by different browsers☆30Updated 7 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 7 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- My IDA scripts, tips and testing techniques for Thick Client applications.☆17Updated 10 years ago
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆36Updated 10 years ago