ORDER - A small Python web-app to practice blind SQLi in order by
☆21Mar 21, 2021Updated 5 years ago
Alternatives and similar repositories for order
Users that are interested in order are comparing it to the libraries listed below
Sorting:
- Chat.JS - Vulnerable NodeJS Web-App to practice NoSQLi and Deserialization exploitation☆31Mar 21, 2021Updated 5 years ago
- TESTR - A Vulnerable Python Web-App to practice XSS and Command Injection☆41Oct 8, 2022Updated 3 years ago
- TUDO — A Vulnerable PHP Web App☆130Dec 22, 2025Updated 2 months ago
- Notes on Preparing for Offsec☆28Jul 24, 2023Updated 2 years ago
- vulnerable windows binaries for exploitation practice☆47Jun 6, 2022Updated 3 years ago
- Easy peasy file uploads☆32Aug 29, 2025Updated 6 months ago
- Simple Ransomware using Python PyQt5 and Cryptography libraries. You can make the design you want using the design files.☆14Jun 11, 2022Updated 3 years ago
- A repository of wordlists for enumeration. Will be added to by my tools when they find interesting new entries☆23Jan 21, 2021Updated 5 years ago
- ☆21Dec 1, 2021Updated 4 years ago
- ☆37Dec 4, 2025Updated 3 months ago
- A python approach to interacting with web shells.☆30Jan 16, 2021Updated 5 years ago
- Exploit Development CheatSheet.☆18Aug 9, 2021Updated 4 years ago
- Collaborative repository to catalogue insecure functions in various programming languages.☆11May 9, 2022Updated 3 years ago
- ☆11Nov 14, 2022Updated 3 years ago
- Command line tool for analyzing .json files generated by bloodhound.py or sharphound for use in Bloodhound.☆20Jan 12, 2019Updated 7 years ago
- A tool to exploit the hash length extension attack in various hashing algorithms☆10Apr 14, 2014Updated 11 years ago
- ☆134Feb 5, 2021Updated 5 years ago
- My customized docker image used for binary exploitation and RE☆14Jul 3, 2021Updated 4 years ago
- ☆15Jun 15, 2021Updated 4 years ago
- 🌩️ Collection of BloodHound queries for Azure☆84Jan 7, 2025Updated last year
- Becoming the spider, crawling through the webs to catch the fly.☆83Jun 25, 2021Updated 4 years ago
- Creating Punched Cards using Laser Printer and Laser Cutter☆15Oct 25, 2022Updated 3 years ago
- Port Swigger Labs divided on the based of level and topic.☆14Mar 15, 2022Updated 4 years ago
- Colored Cat is a syntax highlighter file reader.☆15Jun 21, 2024Updated last year
- DCS World Mod Manager☆11May 21, 2025Updated 10 months ago
- Automated solution for nmap'ing☆27May 17, 2023Updated 2 years ago
- This project aims to provide a comprehensive resource for understanding and testing Cross-Site Scripting (XSS) vulnerabilities, one of th…☆49Jan 10, 2026Updated 2 months ago
- Peap Bomb is a password sprayer for WPA/WPA2 enterprise wireless that is leveraging PEAP for Authentication.☆10Feb 18, 2021Updated 5 years ago
- ☆22May 15, 2025Updated 10 months ago
- Various notes I have compiled during the OSEP PEN-300 course.☆40Mar 16, 2025Updated last year
- Items related to the RedELK workshop given at security conferences☆29Sep 28, 2023Updated 2 years ago
- Whitebox source code review cheatsheet (Based on AWAE syllabus)☆170Feb 16, 2022Updated 4 years ago
- A python based blind SQL injection exploitation script☆144Jan 26, 2020Updated 6 years ago
- Painel para pesquisa e exibição de dados de usuários do Github. Foram utilizados a biblioteca React e a API da plataforma.☆11Jan 13, 2022Updated 4 years ago
- SDK em PHP para integração com a API2 Bling☆18Jan 30, 2019Updated 7 years ago
- Unofficial instructions to fix issues with Wave XLR on Linux☆35Feb 15, 2026Updated last month
- Tips on how to write exploit scripts (faster!)☆561Jul 15, 2024Updated last year
- Modified-Thycotic-Secret-Stealer for use with DPAPI and offline Decryption☆19Aug 5, 2022Updated 3 years ago
- This repository contains scripts about ACL abuse and any other active directory attacking methods.☆36Aug 20, 2023Updated 2 years ago