daviddias / node-dirbuster
β175Updated last year
Related projects: β
- π― RFI/LFI Payload Listβ527Updated 2 months ago
- Web recon script. No need to fear, sumrecon is here!β349Updated last year
- Tips and Tricks for Linux Priv Escalationβ218Updated 3 years ago
- β450Updated this week
- OSCPβ558Updated 2 years ago
- A standalone python script which utilizes python's built-in modules to enumerate SUID binaries, separate default binaries from custom binβ¦β615Updated 3 years ago
- Simple php reverse shell implemented using binary .β394Updated 10 months ago
- Materials for OSCP examβ355Updated 8 months ago
- Local file inclusion exploitation toolβ767Updated last year
- A simple web app with a XXE vulnerability.β220Updated 2 years ago
- This is my OSCP cheat sheet made by combining a lot of different resources online with a little bit of tweaking. I used this cheat sheet β¦β357Updated 3 years ago
- β329Updated 4 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion bβ¦β512Updated 2 years ago
- Writeups for vulnerable machines.β163Updated 2 years ago
- Web Fuzzerβ343Updated last year
- β409Updated last year
- Multi-threaded Python Port Scanner with Nmap Integrationβ351Updated 2 years ago
- A random set of 5 machines for OSCPβ166Updated 4 years ago
- Fast and easy script to manage pentesting training appsβ314Updated 7 months ago
- OpenFuck exploit updated to linux 2018 - Apache mod_ssl < 2.8.7 OpenSSL - Remote Buffer Overflowβ173Updated 6 months ago
- A wordlist of API names for web application assessmentsβ726Updated last year
- Some of the best web shells that you might need!β316Updated last year
- Default usernames and passwords for various systems (VoIP,IPMI,Oracle).β409Updated 4 months ago
- Aggregated wordlist pulled from commonly used tools for discovery, enumeration, fuzzing, and exploitation.β146Updated 2 months ago
- This repository houses some of the small scripts I had used to quickly document throughout my OSCP course. This was referenced on YouTubeβ¦β175Updated 4 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.β1,090Updated 4 months ago
- This cheatsheet is aimed at the CTF Players and Beginners to help them understand Web Application Vulnerablity with examples.β423Updated last year
- this html file creates a csrf poc form to any http request.β265Updated last year
- Writeups for the machines on ethical hacking site Hack the Boxβ238Updated 2 years ago
- Don't let buffer overflows overflow your mindβ431Updated 4 years ago