gquere / pwn_jenkinsLinks
Notes about attacking Jenkins servers
☆2,083Updated last year
Alternatives and similar repositories for pwn_jenkins
Users that are interested in pwn_jenkins are comparing it to the libraries listed below
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,367Updated last month
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,754Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,020Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,298Updated 8 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,724Updated 3 years ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,660Updated last week
- 🎯 XML External Entity (XXE) Injection Payload List☆1,255Updated last year
- List of XSS Vectors/Payloads☆1,333Updated 9 months ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,877Updated 3 years ago
- The Swiss Army knife for automated Web Application Testing☆2,291Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,439Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,266Updated 5 months ago
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,396Updated 8 months ago
- ☆1,153Updated 3 weeks ago
- Red Teaming & Pentesting checklists for various engagements☆2,614Updated 3 months ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,167Updated this week
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,581Updated 2 years ago
- Windows / Linux Local Privilege Escalation Workshop☆2,017Updated 3 years ago
- GraphQLmap is a scripting engine to interact with a graphql endpoint for pentesting purposes. - Do not use for illegal testing ;)☆1,557Updated last year
- ☆1,381Updated last month
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,244Updated 8 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,334Updated 4 years ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆740Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,449Updated 9 months ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆878Updated 4 months ago
- ☆2,287Updated last year
- A Python program to scrape secrets from GitHub through usage of a large repository of dorks.☆2,441Updated last year
- A python script that finds endpoints in JavaScript files☆4,151Updated last year
- Next-Generation Linux Kernel Exploit Suggester☆1,945Updated 2 years ago
- Rockyou for web fuzzing☆2,928Updated last month