ethicalhack3r / scriptsLinks
Small snippets of code we often find useful
☆54Updated 10 years ago
Alternatives and similar repositories for scripts
Users that are interested in scripts are comparing it to the libraries listed below
Sorting:
- Scripts for Deploying new server☆48Updated 2 months ago
- Automating Jenkins Hacking using Shodan API☆94Updated 7 years ago
- a collection of payloads for common webapps☆73Updated 12 years ago
- VyAPI - A cloud based vulnerable hybrid Android App☆84Updated 5 years ago
- Browse and search through nmap's NSE scripts.☆60Updated 8 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Updated 6 years ago
- A web application for generating custom XSS payloads☆77Updated 5 years ago
- Extreme Vulnerable Node Application☆95Updated 6 years ago
- A bash script that fetches and maintains thousands of DNS resolvers☆65Updated 4 years ago
- Tools used for Penetration testing / Red Teaming☆66Updated 6 years ago
- Dockerized version of Sn1per (https://github.com/1N3/Sn1per)☆60Updated 7 years ago
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 4 years ago
- BlindRef serves as the basis for an automated Blind-Based XXE Exploitation Framework☆26Updated 8 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Actarus is a custom tool for bug bounty☆76Updated 5 years ago
- PAVELOW Exploit Toolbox is a BASH script that corresponds with your KALI distro to better help your vulnerability hunting and exploiting …☆87Updated 7 years ago
- Automatically forward HTTP GET & POST requests to SQLMap's API to test for SQLi and XSS☆83Updated 2 years ago
- The Cleveridge Subdomain Scanner finds subdomains of a given domain.☆37Updated 5 years ago
- Hashmash is a tool to aid in generating hashes from user supplied values and Epochs☆63Updated 8 years ago
- This is sample code to demonstrate how one can use SQL Injection vulnerability to download local file from server in specific condition. …☆44Updated 8 years ago
- A collection of scripts used to interact with the Burp Rest API☆52Updated 6 years ago
- Offensive Security Certified Profesional (OSCP) course scripts, some have been generalized☆51Updated 7 years ago
- A tool to hunt for publicly accessible DigitalOcean Spaces☆156Updated 5 years ago
- TheDoc is a simple but very useful SQLMAP automator with built in admin finder, hash cracker(using hashca) and more!☆98Updated 7 years ago
- Pillage a git repo found in an accessible web root☆61Updated 14 years ago
- Clickjacking PoC Generator☆35Updated 4 years ago
- SharePoint scanner and fingerprinter based on WPScan☆25Updated 11 years ago
- A centralized dashboard for running and scheduling WordPress scans powered by wpscan utility.☆77Updated 5 years ago