andresriancho / nimbostratus-target
This repository holds a target infrastructure you can use for running the nimbostratus tools.
☆24Updated 10 years ago
Alternatives and similar repositories for nimbostratus-target
Users that are interested in nimbostratus-target are comparing it to the libraries listed below
Sorting:
- OAuth Security Cheatsheet☆40Updated 11 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- ☆29Updated 7 years ago
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- AWS S3 Bucket/Object Finder☆24Updated 7 years ago
- Burp Suite plugin that allow to deserialize Java objects and convert them in an XML format. Unpack also gzip responses. Based on BurpJDSe…☆20Updated last year
- A basic AIX enumeration guide for penetration testers/red teamers☆32Updated 8 years ago
- A central place to keep track of relevant BountyMachine talks, blogs, and interesting things!☆33Updated 6 years ago
- Docker Version of Aquatone☆14Updated 6 years ago
- Scripts that I've written that others may find useful☆14Updated 2 years ago
- A proof of concept for delivering webbugs via AWS lambda☆45Updated 6 years ago
- This is a Burp extension for adding additional payloads to active scanner that require out-of-band validation. Works great with XSSHunter☆20Updated 8 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 6 years ago
- A collection of slides, videos, and proof-of-concept scripts from various Rhino presentations.☆38Updated 6 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 11 years ago
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆31Updated 10 years ago
- A number of scripts POC's and problems solved as pentests move along.☆45Updated 11 months ago
- Tool orchestrator. Specify targets and run sets of tools against them.☆19Updated 8 years ago
- A tool to evaluate Content Security Policies.☆71Updated 4 years ago
- Deliberately vulnerable web application☆22Updated 7 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- Verification tools for CVE-2016-1287☆33Updated 8 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 7 years ago
- Docker auditing and enumeration script.☆22Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- An AWS Lambda vulnerable application written in flask.☆48Updated 7 years ago
- Slides from my AD Privesc talk at WAHCKon 2017☆16Updated 8 years ago