bored-engineer / hackeroni-slack-disclosure-botView external linksLinks
HackerOne Public Disclosure Slack Bot
☆20Sep 19, 2022Updated 3 years ago
Alternatives and similar repositories for hackeroni-slack-disclosure-bot
Users that are interested in hackeroni-slack-disclosure-bot are comparing it to the libraries listed below
Sorting:
- Cheat sheets☆10Jul 4, 2016Updated 9 years ago
- Slightly modified version of https://raw.githubusercontent.com/killswitch-GUI/CobaltStrike-ToolKit/master/HTTPsC2DoneRight.sh☆12Nov 16, 2017Updated 8 years ago
- Call your own DLL from VBA and execute code under process svchost.exe with WMI☆12Mar 6, 2020Updated 5 years ago
- Burp extension for automated handling of CSRF tokens☆16Feb 27, 2018Updated 7 years ago
- Vulnerable Linux socket game for educational purposes☆22Apr 22, 2017Updated 8 years ago
- Golang PoC that sandboxes Defender (or other PPL) by setting its token integrity to Untrusted.☆12May 28, 2025Updated 8 months ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Sep 2, 2019Updated 6 years ago
- A duckyscript compatible Pi-Zero project, which utilises nmap - in particular the OS Detection features - to trigger OS-specific payloads…☆16Nov 29, 2016Updated 9 years ago
- Dump Lsass Memory Using a Reflective Dll☆14Feb 4, 2022Updated 4 years ago
- EmPyre Web Interface☆12Mar 23, 2017Updated 8 years ago
- A deliberately vulnerable modern day app with lots of DOM related bugs☆35May 19, 2019Updated 6 years ago
- C# alternative to the linux "cat" command... Prints file contents to console. For use with Cobalt Strike's Execute-Assembly☆15Jul 15, 2021Updated 4 years ago
- SlyPI☆20Jun 13, 2013Updated 12 years ago
- Script written in python to perform Resource-Based Constrained Delegation (RBCD) attack by leveraging Impacket toolkit.☆21Jul 6, 2021Updated 4 years ago
- Bash script to take the powerkatz.dll files, encode them using base64 and then replace the old binaries with the new in the Invoke-Mimika…☆16Oct 8, 2016Updated 9 years ago
- Web Application Firewall For Limited Exploitation☆17Nov 15, 2017Updated 8 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69May 7, 2016Updated 9 years ago
- Actarus is a custom tool for bug bounty☆77Nov 14, 2019Updated 6 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆19Aug 2, 2016Updated 9 years ago
- A cloud automation system for Red Teams based on Terraform and Ansible☆24Apr 21, 2021Updated 4 years ago
- Smuggle a file to a user's browser☆20Apr 16, 2022Updated 3 years ago
- A Web Server to hide stuff☆21Apr 29, 2022Updated 3 years ago
- Apophis is a Bash script that leverages tools such as DotNetToJScript, ConfuserEx, Net-Obfuscator etc. to generate 'Shellcode runners'.☆20Mar 12, 2023Updated 2 years ago
- An automated XSS payload generator written in python.☆314Jun 2, 2016Updated 9 years ago
- ☆18Jan 27, 2018Updated 8 years ago
- Comprehensive Pivoting Framework☆20Sep 20, 2016Updated 9 years ago
- a mass web screenshot tool for mapping web networks.☆24Apr 16, 2015Updated 10 years ago
- Loads shellcode from a resource file.☆22Aug 15, 2019Updated 6 years ago
- ☆21Dec 8, 2022Updated 3 years ago
- Status bar application for OS X to toggle the state of the system HTTP/HTTPS proxy.☆25Aug 31, 2021Updated 4 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Sep 16, 2018Updated 7 years ago
- During pentesting I often miss screenshots of events for reports due to the quick pace of testing and a lack of foreknowledge about what …☆26Jul 18, 2019Updated 6 years ago
- Walking the PEB in VBA☆24Apr 6, 2020Updated 5 years ago
- Dynamic DNS Update Bruteforce Tool☆29Feb 8, 2017Updated 9 years ago
- ☆23Mar 9, 2022Updated 3 years ago
- Shodan.io connector for Phantom Cyber Security Orchestration☆23Sep 13, 2016Updated 9 years ago
- Using SEH to bypass CFG☆30Mar 28, 2017Updated 8 years ago
- Exploit insecure crossdomain.xml files.☆26Apr 25, 2017Updated 8 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago