☆21Nov 13, 2019Updated 6 years ago
Alternatives and similar repositories for otphacks
Users that are interested in otphacks are comparing it to the libraries listed below
Sorting:
- vulnerable single sign on☆150Aug 1, 2024Updated last year
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Collection of different exploitation scenarios of JWT.☆21Jul 23, 2021Updated 4 years ago
- A sub-domain enumeration tool☆20May 18, 2020Updated 5 years ago
- Cheat Sheets, Metodologies etc.☆19Apr 12, 2019Updated 6 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- C# utility that uses WMI to run "cmd.exe /c netstat -n", save the output to a file, then use SMB to read and delete the file remotely☆38Jan 3, 2020Updated 6 years ago
- CVE-2019-16097 PoC☆23Sep 19, 2019Updated 6 years ago
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Oct 24, 2019Updated 6 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- The Recon scanning tool scans websites for open files & directories specified in the custom config file. Default server configuration fil…☆15Apr 4, 2018Updated 7 years ago
- Communicate with a remote shell easily☆12Dec 10, 2017Updated 8 years ago
- This repository is created for personal use and added tools from my blog post.☆14Aug 27, 2023Updated 2 years ago
- Automatic DNS Enumeration Tool with various functions☆13Sep 28, 2021Updated 4 years ago
- ☆15Aug 31, 2020Updated 5 years ago
- My solutions for HackSys Extreme Vulnerable Driver☆12Apr 22, 2018Updated 7 years ago
- Hugo repository for main ironpeak.be website.☆12Feb 17, 2026Updated 2 weeks ago
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Registry permission scanner written in C# for finding potential privesc avenues within registry☆86Mar 9, 2021Updated 4 years ago
- Retrive the status codes from a list of URLs☆33May 18, 2020Updated 5 years ago
- ☆14Jul 8, 2019Updated 6 years ago
- Custom Credential Provider to Log credentials on Windows 7 and higher☆16Mar 17, 2018Updated 7 years ago
- A vulnerable web application to explain and illustrate deserialization of untrusted data with Pickle.☆13Sep 23, 2017Updated 8 years ago
- Apply a filter to the events being reported by windows event logging☆15Sep 10, 2020Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A lab to play with authentication and authorisation problems☆98Mar 7, 2023Updated 2 years ago
- Scan secrets from Continuous Integration Build Logs☆53Oct 14, 2019Updated 6 years ago
- Very loud vBulletin exploit☆14Aug 12, 2020Updated 5 years ago
- stdin writes to slack☆14Feb 8, 2020Updated 6 years ago
- ☆18Dec 4, 2018Updated 7 years ago
- Obtains a list of GPOs based on known Client Side Extensions (CSE) that normally contain passwords☆33May 11, 2019Updated 6 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Aug 13, 2018Updated 7 years ago
- JWT Fuzzer for BurpSuite. Adds an Intruder hook for on-the-fly JWT fuzzing.☆100Jul 29, 2019Updated 6 years ago
- An auto-scoring capture-the-flag game focusing on TOCTOU vulnerabilities☆21Oct 28, 2020Updated 5 years ago
- Proof of concept code for client-side vulnerabilities☆17Mar 14, 2019Updated 6 years ago
- Automated tool to find backup files that may disclose a website's source code☆20Oct 13, 2022Updated 3 years ago