cldrn / pentestingLinks
Misc resources for my daily pentesting...
☆19Updated 10 months ago
Alternatives and similar repositories for pentesting
Users that are interested in pentesting are comparing it to the libraries listed below
Sorting:
- ☆21Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 7 years ago
- Generate pentest reports based on github issues.☆16Updated 3 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 7 years ago
- Windows 10 Exploit☆30Updated 7 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆33Updated last year
- A collection of shell code conversion scripts that I have written over time for repetitive tasks☆19Updated 6 years ago
- ☆21Updated 6 years ago
- Windows LNK/URL shortcut auto-binding hotkey (not a bug, feature)☆30Updated 7 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 6 years ago
- \ PowerAvails Powershell /☆10Updated 7 years ago
- This repository contains various files linked to Operation Shadowhammer as it was originally discovered by Kaspersky Team.☆12Updated 6 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- ☆14Updated 4 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Updated 9 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Windows Installer Bypass using Rollback Script .rbs and .rbf - Race Condition☆22Updated 6 years ago
- Pentest scripts for abuse Bash on Windows (Cygwin/WSL) - HackLu 2018☆45Updated 6 years ago
- Fuzzing Framework☆10Updated 8 years ago
- IDA Pro plugin that rename functions on load, based on functionality☆19Updated 7 years ago
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- Security Advisories☆11Updated 6 years ago
- Gives context to a system. Uses EQGRP shadow broker leaked list to give some descriptions to processes.☆48Updated 8 years ago
- ☆11Updated 8 years ago
- Communicate with a remote shell easily☆12Updated 8 years ago
- ☆18Updated 6 years ago
- Short handy snippets from the @mwrlabs team☆20Updated 8 years ago
- ☆27Updated 5 years ago
- Offline Security Focus Database☆31Updated 13 years ago