gcxtx / Zoom
Automatic & lightning fast wordpress vulnerability scanner
☆45Updated 3 years ago
Alternatives and similar repositories for Zoom:
Users that are interested in Zoom are comparing it to the libraries listed below
- Reconnaissance and Enumeration automation script☆52Updated 4 years ago
- Have you ever faced with the lack of possibility of using NMap? For instance if you have reverse shell as an unprivileged user and there …☆43Updated 2 years ago
- For Interview, OSCP proof of concept code during the course.☆17Updated 5 years ago
- The Multi-Tool Web application vulnerability scanner.☆52Updated 3 years ago
- SetMyKali is a bash based tool to configure and customize kali linux☆69Updated 2 years ago
- Buffer Overflows☆29Updated 4 years ago
- Journey to Try Harder !!!☆32Updated 5 years ago
- API Pentesting notes.☆96Updated 4 months ago
- Simple fork from degoogle original project with bug hunting purposes☆87Updated 2 years ago
- A list of commands, scripts, resources, and more that I have gathered and attempted to consolidate for use as OSCP (and more) study mater…☆26Updated 5 years ago
- Checks whether a domain is hosted on a cloud service such as AWS, Azure or CloudFlare☆58Updated 2 years ago
- Sharing my cheat-sheet of commands that I collected during prep for OSCP!☆41Updated 4 years ago
- LFITester is a Python3 program that automates the detection and exploitation of Local File Inclusion (LFI) vulnerabilities on a server.☆105Updated 3 months ago
- A simple Bash one liner with aim to automate CRLF vulnerability scanning.☆68Updated 4 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆62Updated 5 years ago
- Notes from OSCP, CTF, security adventures, etc...☆58Updated last year
- To help you go through the pentesting phases and the tools each phase can have. Some pratical examples of the tools are present too.☆46Updated 5 years ago
- ☆53Updated 3 years ago
- When it comes to exploiting web application security, this is a methodology. Enumeration and Networking guidelines are also listed to hel…☆22Updated 3 years ago
- A command line tool to search AttackerKB.☆51Updated 4 years ago
- Here Are Some Bug Bounty Resource From Twitter☆89Updated 2 months ago
- ☆31Updated 3 years ago
- RECON Notes taking from every fucking book about bugbounty and web-app penetration testing exists☆20Updated 5 years ago
- ☆23Updated 3 years ago
- Penetration testing tools cheat sheet, a quick reference high level overview for typical penetration testing engagements. Convenient comm…☆64Updated 2 years ago
- A python based blind SQL injection exploitation script☆136Updated 5 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- golang tool to scan domains or single domains with know security issues against xmlrpc☆62Updated last year
- ☆47Updated 7 years ago
- A Powerfull BUG HUNTING TOOL. Supports SQL, XSS, PHP code execution, SSRF,.... I had Appended My Own Payloads which I had founded during …☆49Updated 3 years ago