ZephrFish / Blog_Backup
A repository with various tutorials on how to do things in Pentesting, setup environments and other things
☆20Updated 7 years ago
Alternatives and similar repositories for Blog_Backup:
Users that are interested in Blog_Backup are comparing it to the libraries listed below
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- ☆47Updated 9 years ago
- ~ BannerGrab☆26Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 12 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- ☆10Updated 8 years ago
- Provide a sort of shell-ish interface to make file directory traversal quicker and easier.☆24Updated 8 years ago
- PHP tool to test XSS☆23Updated 5 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- A collection of Nmap NSE scripts that I made.☆27Updated 12 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 5 years ago
- OWASP Skanda - SSRF Exploitation Framework☆37Updated 11 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Pentester's Tools Parser (PTP) provides an unified way to retrieve the information from all (final goal) automated pentesting tools and a…☆31Updated last year
- Web Application Security related tools. Includes backdoors, proof of concepts and tricks☆37Updated 10 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆22Updated 6 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- ☆20Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆51Updated 4 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Updated 6 years ago
- Async'ly gather unique usernames thru null SMB sessions and bruteforce them with 2 passwords☆51Updated 7 years ago
- BlackHat Europe 2017 Slides☆26Updated 7 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆47Updated 2 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago