corneacristian / NotesLinks
☆16Updated 4 years ago
Alternatives and similar repositories for Notes
Users that are interested in Notes are comparing it to the libraries listed below
Sorting:
- This is to reorganize my notes☆10Updated 4 years ago
- Old version of mimikatz for OSCP labs☆17Updated 5 years ago
- Preparation for OSWE☆46Updated 5 years ago
- Collection of username lists for enumerating kerberos domain users☆106Updated 8 years ago
- A simple NodeJS WebSocket WebApp vulnerable to blind SQL injection☆71Updated 4 years ago
- Notes for CRTP☆42Updated 5 years ago
- A Burp Suite plugin/extension that offers a shell in Burp. Both useful for OS Command injection and LFI exploration☆78Updated 5 years ago
- Cheat sheet☆36Updated 6 years ago
- Wordlist to bruteforce for LFI☆128Updated 6 years ago
- Dockerized labs For Web Expert (OSWE) certification. Preparation for coming AWAE Training ...☆123Updated 4 years ago
- Repo for OSWE related video content for @SecAura Youtube Channel☆37Updated 3 years ago
- SSTI Payload Generator☆92Updated 3 years ago
- OpenNetAdmin 18.1.1 - Remote Code Execution☆31Updated 5 years ago
- Multi-threaded, IPv6 aware, wordlists/single-user username enumeration via CVE-2018-15473☆111Updated last year
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆78Updated 5 years ago
- A python based blind SQL injection exploitation script☆142Updated 6 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆26Updated this week
- ☆34Updated 3 years ago
- ☆85Updated 5 years ago
- Exploit for CVE-2021-3129☆68Updated 4 years ago
- Vulnerable SAML infrastructure training applicaiton☆54Updated 3 years ago
- Python exploit for the CVE-2021-22204 vulnerability in Exiftool☆94Updated 4 years ago
- ☆39Updated 2 years ago
- Reverse Shell-able Windows exploits short POCs.☆35Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆93Updated 2 years ago
- Simple forward and reverse shells that can be compiled and used on pen tests to avoid AV and used to get better access.☆29Updated 13 years ago
- ☆133Updated 5 years ago
- Juicy Potato for x86 Windows☆129Updated 6 years ago
- Send controlled amount of bytes, send msf-pattern, calculate offset, custom buffer, badcharacters all in one.☆15Updated last year
- Becoming the spider, crawling through the webs to catch the fly.☆81Updated 4 years ago