carlospolop / Leakos
☆72Updated 10 months ago
Alternatives and similar repositories for Leakos:
Users that are interested in Leakos are comparing it to the libraries listed below
- ☆53Updated 2 years ago
- ☆68Updated last year
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆65Updated last year
- ☆42Updated 2 years ago
- Tools used for Pentesting☆22Updated last year
- Filter URLs to save your time.☆59Updated 2 years ago
- My Offensive Security OSWA certification experience and my personal opinion what helps in preparation for the exam☆38Updated last year
- A python3 script searching for secret on swaggerhub☆63Updated 3 years ago
- Web Hacking and Red Teaming MindMap☆70Updated 2 years ago
- Red Teaming tools and techniques☆50Updated 2 years ago
- Tips, Tricks, and Scripts for Linux Post Exploitation☆38Updated 2 years ago
- HTTP verb tampering & methods enumeration☆56Updated 2 years ago
- A simple automation tool to detect lfi, rce and ssti vulnerability☆55Updated 3 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆70Updated last year
- This tool is designed to test for file upload and XXE vulnerabilities by poisoning XLSX files.☆75Updated last year
- ☆55Updated 10 months ago
- ☆53Updated last year
- ☆74Updated 8 months ago
- PassMute - A multi featured Password Transmutation/Mutator Tool☆51Updated last year
- Arescan is a powerful web directory discovery tool that helps you uncover hidden directories and links on any website. By performing a br…☆30Updated last year
- Simple chrome extension for full name extraction and conversion to emails/usernames. Utilizes the 'people' tab of the target company on L…☆24Updated 3 months ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆26Updated 2 years ago
- ☆19Updated 10 months ago
- Help recon of hostnames from specific ASN or CIDR, thanks to Robtex and BGP.HE☆53Updated 4 months ago
- External recon toolkit☆45Updated 2 months ago
- Python tool to test known techniques to bypass 403 and 401 HTTP responses.☆35Updated last year
- The great Microsoft exchange hack: A penetration tester’s guide (exchange penetration testing)☆94Updated 9 months ago
- My personal collection of nuclei templates made for fuzzing.☆27Updated 6 months ago