blackhatruby / BHR_Labs
Black Hat Ruby book | Lab files | Buy the book https://www.amazon.com/dp/B08JHSF6GT
☆86Updated 4 years ago
Alternatives and similar repositories for BHR_Labs:
Users that are interested in BHR_Labs are comparing it to the libraries listed below
- Tests URLs for Local File Inclusion (LFI), Remote File Inclusion (RFI), SQL injection (SQLi), and Cross Site Scripting (XSS), Server Si…☆72Updated last month
- A CLI tool & library to enhance and speed up script/exploit writing with string conversion/manipulation.☆82Updated 4 months ago
- Rubyfu, where Ruby goes evil!☆333Updated last year
- A ruby http/https proxy to do EVIL things.☆170Updated last year
- The scripts I write to help me on my bug bounty hunting☆121Updated 3 years ago
- A micro-framework and tool for performing reconnaissance.☆35Updated 4 months ago
- A CLI tool to identify the hash type of a given hash.☆109Updated 2 years ago
- eLearnSecurity Certified Exploit Development☆100Updated 3 years ago
- Vulnerable code snippets repository showcasing different vulnerabilities to practice code analysis skills.☆22Updated last year
- ronin-web is a collection of useful web helper methods and commands.☆42Updated 4 months ago
- ☆44Updated 4 years ago
- A list of examples and references of hacking with Bash and the Curl command☆51Updated 4 years ago
- The wordlists that have been compiled using disclosed reports at HackerOne bug bounty platform☆50Updated 4 years ago
- A Ruby micro-framework for writing and running exploits☆72Updated last month
- Windows for Red Teamers☆125Updated 2 years ago
- ☆39Updated last year
- Toolset for automating common management actions used in CTF's☆37Updated 3 years ago
- 🔭 A modern, async Ruby gem for Shodan.☆116Updated 5 months ago
- ☆77Updated 3 years ago
- List of red team resources☆91Updated 7 years ago
- A curated list of security resources for a Ruby on Rails application☆56Updated last year
- My Linux Privilege Escalation notes which is part of my OSCP Preperation☆70Updated 2 years ago
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- A common database library for managing and querying security data☆14Updated 5 months ago
- Meticulously curated security notes with Emphasis on Application Security, DevSecOps, Cloud Computing, and Penetration Testing.☆134Updated 9 months ago
- PenTest Methodology☆14Updated last month
- ☆41Updated 3 years ago
- Made your bugbounty subdomains reconnaissance easier with Hunt3r the web application reconnaissance framework☆165Updated last year
- Ruby For Ethical Hackers☆27Updated last year
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated this week