☆21Nov 13, 2019Updated 6 years ago
Alternatives and similar repositories for otphacks
Users that are interested in otphacks are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- vulnerable single sign on☆149Aug 1, 2024Updated last year
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆39Jan 3, 2020Updated 6 years ago
- Quick WAF "paranoid" Doctor Evaluation | WAFPARAN01D3 Tool☆23Nov 22, 2021Updated 4 years ago
- CVE-2019-16097 PoC☆23Sep 19, 2019Updated 6 years ago
- LetMeOutOfYour.net Resources☆21Jul 15, 2020Updated 5 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 7 years ago
- Nashorn Post Exploitation☆32Feb 12, 2018Updated 8 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Hugo repository for main ironpeak.be website.☆12Feb 17, 2026Updated last month
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago
- AvBuster The stress Tester for your Anti Malware solutions☆41Feb 12, 2021Updated 5 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Jul 29, 2019Updated 6 years ago
- ☆19Apr 29, 2019Updated 6 years ago
- The Path of the PyData Ninja☆16Sep 14, 2015Updated 10 years ago
- Basic app to practice modsec bypass☆22May 12, 2016Updated 9 years ago
- Some exploits to bypass Safer Mode in Ghostscript☆18Oct 24, 2020Updated 5 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- ☆12Mar 3, 2026Updated 3 weeks ago
- Video files for eBook: "Bypassing AVs by C#.NET Programming"☆41Jun 6, 2023Updated 2 years ago
- A lab to play with authentication and authorisation problems☆99Mar 7, 2023Updated 3 years ago
- ☆18Dec 4, 2018Updated 7 years ago