gquere / pwn_jenkinsLinks
Notes about attacking Jenkins servers
☆2,064Updated last year
Alternatives and similar repositories for pwn_jenkins
Users that are interested in pwn_jenkins are comparing it to the libraries listed below
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,245Updated 4 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,974Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,740Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,220Updated 4 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,832Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,683Updated 3 years ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,186Updated 11 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,414Updated 8 months ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,616Updated last month
- Automated & Manual Wordlists provided by Assetnote☆1,472Updated last week
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,539Updated last year
- List of XSS Vectors/Payloads☆1,238Updated 6 months ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,049Updated last week
- ☆2,269Updated last year
- ☆1,009Updated 3 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,271Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,973Updated 2 years ago
- The Swiss Army knife for automated Web Application Testing☆2,258Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,219Updated 2 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,971Updated 10 months ago
- Rockyou for web fuzzing☆2,840Updated last month
- XSS payloads designed to turn alert(1) into P1☆1,372Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,569Updated 10 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,216Updated 5 months ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,422Updated 6 months ago
- ☆1,002Updated 3 weeks ago
- Take a list of domains and probe for working HTTP and HTTPS servers☆3,023Updated last year
- ☆1,344Updated 3 months ago
- ☆1,186Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,248Updated 9 months ago