gemography / backend-coding-challengeView external linksLinks
☆14Nov 26, 2020Updated 5 years ago
Alternatives and similar repositories for backend-coding-challenge
Users that are interested in backend-coding-challenge are comparing it to the libraries listed below
Sorting:
- YARA rule-based automation system to detect network attacks at byte-level☆13May 12, 2021Updated 4 years ago
- Webarchive is a Go package for pentesters and developers to interacting with the Wayback Machine's CDX API and integrate web archive util…☆11Feb 25, 2024Updated last year
- A collection of tools for managing and automating vulnerability management.☆13Mar 24, 2022Updated 3 years ago
- Scanning in the middlelayer, v2☆10Updated this week
- Java DNS Post Exploitation Tool☆11Jul 21, 2024Updated last year
- BAT is a tool to help everyone to securing their web-servers.☆10Mar 29, 2021Updated 4 years ago
- POC for CVE-2024-31982: XWiki Platform Remote Code Execution > 14.10.20☆10Jun 22, 2024Updated last year
- Scans a given directory tree for interesting assembly references☆17Jan 22, 2026Updated 3 weeks ago
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆10Mar 25, 2021Updated 4 years ago
- Enhanced-PsExec the GUI edition☆13Sep 8, 2021Updated 4 years ago
- Post-Exploitation methods inside any extension, Presented @DEFCON29: "Extension-Land exploits and rootkits in your browser extensions".☆11Nov 29, 2021Updated 4 years ago
- A simple tool to check subdomains for clickjacking attack.☆12Mar 30, 2021Updated 4 years ago
- Chrome Extensions Dataset☆10Updated this week
- C# client for SonarQube 8.x☆11Apr 6, 2023Updated 2 years ago
- get the http allowed methods for URLs list☆13Feb 22, 2021Updated 4 years ago
- Proof of concept about the privilege escalation flaw identified in Google's Osconfig☆10Sep 20, 2020Updated 5 years ago
- Reverse whois query tool☆11Jul 28, 2016Updated 9 years ago
- TONBI is a source code auditing scanner against framework based web application. It hunts for various vulnerabilites in such as Laravel, …☆10Jan 25, 2022Updated 4 years ago
- dragonscan is a information gathering tool coded in python cloning in /root/ folder is recommended☆12Aug 31, 2019Updated 6 years ago
- CVE-2018-13379 Script for Nmap NSE.☆12Sep 9, 2020Updated 5 years ago
- ☆20Jan 19, 2021Updated 5 years ago
- Yet another cross compiling reverse/bind payload generator written in Go.☆12Sep 22, 2021Updated 4 years ago
- A Python script to swoop and decrypt passwords from Chrome's local storage.☆11Dec 10, 2018Updated 7 years ago
- Git-Finder is a tool that searches through public repositories to find sensitive information like password,auth_token, etc uploaded to t…☆12Mar 15, 2020Updated 5 years ago
- Real-Time JavaScript reverse engineering and debugging suite - Burp Suite, but for JavaScript☆16Jul 23, 2025Updated 6 months ago
- RDP EXPLOİT☆13Oct 28, 2019Updated 6 years ago
- 5 Minutes script to bypass Sucuri Cloudproxy in Python by using js2py☆12Sep 3, 2019Updated 6 years ago
- Database smell detector☆13Jan 24, 2018Updated 8 years ago
- Modules Prestashop Vuln Arbitrary File Upload☆10Dec 29, 2019Updated 6 years ago
- A privilege escalation exploit in the Steam Client☆13Aug 11, 2019Updated 6 years ago
- Identify the unused properties in your CSS☆15Jan 5, 2023Updated 3 years ago
- SubDomain Finder☆13Nov 9, 2021Updated 4 years ago
- Implemetation Denial of services attack with python (socket programming and threading)☆16Jun 1, 2020Updated 5 years ago
- Vulnerability Knowledge Base comparison tool☆13Feb 9, 2022Updated 4 years ago
- Hacking ZXHN H108N Router (brute-force)☆12Mar 21, 2019Updated 6 years ago
- ☆13Feb 22, 2023Updated 2 years ago
- Reflective DLL injection is a library injection technique in which the concept of reflective programming is employed to perform the loadi…☆17Jul 20, 2017Updated 8 years ago
- Hacking the Wifi Spy Tank YD-211S☆11Nov 1, 2019Updated 6 years ago
- Python script that automate the process of generating various reverse shells.☆15Mar 22, 2021Updated 4 years ago