dogancanbakir / pirebokLinks
pîrebok (from Kurdish "witch") - a guided adversarial fuzzer
☆15Updated 2 years ago
Alternatives and similar repositories for pirebok
Users that are interested in pirebok are comparing it to the libraries listed below
Sorting:
- μετάμάσκα - malevolent payload classifier☆24Updated 2 years ago
- Simple python script to check against hypothetical JWT vulnerability.☆51Updated 4 years ago
- Take domains on stdin and output them on stdout if they get resolved☆33Updated 3 years ago
- 📡 Ease file sharing during pentest/CTF 🎸☆12Updated 2 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Forblaze - A Python Mac Steganography Payload Generator☆57Updated 3 years ago
- ☆21Updated last week
- ☆25Updated 3 weeks ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆10Updated 3 years ago
- A Burp Suite extension implementing the Signing HTTP Messages draft-ietf-httpbis-message-signatures-01 draft.☆41Updated 3 years ago
- an Evil Java RMI Registry.☆52Updated 2 years ago
- GTFO Command Line Interface for easy binaries search commands that can be used to bypass local security restrictions in misconfigured sys…☆18Updated last week
- visually see issues with supported cipher suites☆16Updated last year
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 3 years ago
- An injector that use PT_LOAD technique☆12Updated 2 years ago
- ☆17Updated 2 years ago
- This tool is useful to find a particular string in a list of URLs using tesseract's OCR (Optical Character Recognition) capabilities☆31Updated 3 years ago
- This little script for gathering chaos.projectdiscovery.io recon data in an organized way and finding the daily differences on it☆17Updated 5 years ago
- A basic proxylogon scanner☆27Updated 4 years ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- A tool for check available dependency packages across npmjs, PyPI or RubyGems registry.☆30Updated 3 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆20Updated 3 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆16Updated last year
- Reverse_Shell Implemented in C++ with the ability to bypass sandboxes☆12Updated 4 years ago
- ☆26Updated 3 years ago
- SMB Auto Relay provides the automation of SMB/NTLM Relay technique for pentesting and red teaming exercises in active directory environme…☆47Updated 4 years ago
- Writeup of CVE-2020-15906☆48Updated 4 years ago
- Checklist for pentests, handy commands for to remembers, and a few tools to work on here and there. Far from complete!☆26Updated 2 years ago