☆41May 6, 2017Updated 8 years ago
Alternatives and similar repositories for xapi-launch
Users that are interested in xapi-launch are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- The offical exploit for Pandora v7.0NG Post-auth Remote Code Execution CVE-2019-20224☆14Jan 10, 2020Updated 6 years ago
- It contain google dork to find the wsdl file.☆13May 27, 2020Updated 5 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- nxdomain subdomain enumeration☆10Jul 17, 2022Updated 3 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Serverless GPU API endpoints on Runpod - Get Bonus Credits • AdSkip the infrastructure headaches. Auto-scaling, pay-as-you-go, no-ops approach lets you focus on innovating your application.
- CTF tasks created☆11Jan 12, 2023Updated 3 years ago
- Zeek scripts that provide an alternative log file logging TLS/SSL traffic☆12May 4, 2021Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Aug 16, 2020Updated 5 years ago
- Yet another dirbuster tool☆13Oct 16, 2023Updated 2 years ago
- Tool for checking reflecting Parameters in a URL.☆10Aug 31, 2020Updated 5 years ago
- -☆11Nov 21, 2020Updated 5 years ago
- Portfolio website.☆10Nov 29, 2023Updated 2 years ago
- This is both a terrible and wonderful idea.☆12Oct 2, 2019Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- This repository is a collection of Awesome XSS Payloads in 1 txt file☆11Dec 23, 2019Updated 6 years ago
- CVE-2020-1337 a bypass of (PrintDemon) CVE-2020-1048’s patch☆14Aug 11, 2020Updated 5 years ago
- ☆11Jul 28, 2020Updated 5 years ago
- Collection of useful command line commands☆14Dec 10, 2021Updated 4 years ago
- Scanner for public s3 buckets☆12Oct 23, 2017Updated 8 years ago
- List of special metadata IPs used in cloud services☆11Aug 9, 2019Updated 6 years ago
- Simple smtp server in go☆11Jul 17, 2017Updated 8 years ago
- ☆20Aug 18, 2020Updated 5 years ago
- Accompanying material needed for the workshop☆11Jun 14, 2023Updated 2 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Jul 28, 2016Updated 9 years ago
- ☆15Aug 11, 2020Updated 5 years ago
- ☆11Jun 19, 2024Updated last year
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- Penetration Testing Methodology - short notes☆11May 30, 2015Updated 10 years ago
- A collection of my answers to the exercises in Modern Cryptography: Theory and Practice by Wenbo Mao☆10Oct 8, 2017Updated 8 years ago
- Extract parameters/paths from urls☆17Aug 2, 2020Updated 5 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- A tool to run a command when the target of a symlink changes☆16Apr 28, 2016Updated 10 years ago
- POC for CVE-2019-14339 Canon PRINT 2.5.5☆14Sep 15, 2019Updated 6 years ago
- A CLI that utilizes Okta IdP via SAML to acquire temporary AWS credentials☆10Jun 30, 2021Updated 4 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- Open Redirect Vulnerability Payload List☆10Feb 23, 2021Updated 5 years ago
- An assortment of general guides I've currated for general teaching purposes focusing on red / blue team methodologies and tasks.☆13Feb 3, 2018Updated 8 years ago