gquere / pwn_jenkinsLinks
Notes about attacking Jenkins servers
☆2,065Updated last year
Alternatives and similar repositories for pwn_jenkins
Users that are interested in pwn_jenkins are comparing it to the libraries listed below
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,250Updated 4 months ago
- A curated list of amazingly awesome Burp Extensions☆3,226Updated 4 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,974Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,741Updated last year
- 🎯 XML External Entity (XXE) Injection Payload List☆1,186Updated 11 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,413Updated 9 months ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,216Updated 5 months ago
- Automated & Manual Wordlists provided by Assetnote☆1,476Updated 2 weeks ago
- XSS payloads designed to turn alert(1) into P1☆1,373Updated last year
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,049Updated last week
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,834Updated 3 years ago
- List of XSS Vectors/Payloads☆1,239Updated 6 months ago
- ☆1,186Updated 2 years ago
- PwnFox is a Firefox/Burp extension that provide usefull tools for your security audit.☆1,177Updated 11 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,271Updated 4 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,972Updated 2 years ago
- File upload vulnerability scanner and exploitation tool.☆3,223Updated 2 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,683Updated 3 years ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,616Updated last month
- Red Teaming & Pentesting checklists for various engagements☆2,570Updated 10 months ago
- ☆1,346Updated 3 months ago
- ☆2,270Updated last year
- Docker Enumeration, Escalation of Privileges and Container Escapes (DEEPCE)☆1,340Updated 4 months ago
- The XSS Hunter service - a portable version of XSSHunter.com☆1,532Updated 2 years ago
- ☆1,002Updated last month
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,542Updated last year
- The Swiss Army knife for automated Web Application Testing☆2,262Updated last year
- Subdomain Takeover tool written in Go☆1,984Updated last year
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆730Updated last year
- ☆1,009Updated 3 years ago