gquere / pwn_jenkins
Notes about attacking Jenkins servers
☆2,031Updated 7 months ago
Alternatives and similar repositories for pwn_jenkins:
Users that are interested in pwn_jenkins are comparing it to the libraries listed below
- Automatic SSRF fuzzer and exploitation tool☆3,084Updated 8 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,708Updated 9 months ago
- A curated list of amazingly awesome Burp Extensions☆3,077Updated this week
- SSRF (Server Side Request Forgery) testing resources☆2,385Updated 4 months ago
- The Swiss Army knife for automated Web Application Testing☆2,195Updated 9 months ago
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆1,896Updated last year
- ☆2,237Updated last year
- Subdomain Takeover tool written in Go☆1,938Updated last year
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,377Updated last month
- A security tool for multithreaded information gathering and service enumeration whilst building directory structures to store results, al…☆2,140Updated 2 years ago
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆3,868Updated 10 months ago
- This script is intended to automate your reconnaissance process in an organized fashion☆1,950Updated 3 years ago
- Windows / Linux Local Privilege Escalation Workshop☆1,920Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,134Updated 4 months ago
- Rockyou for web fuzzing☆2,707Updated last week
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,613Updated 3 years ago
- Red Teaming & Pentesting checklists for various engagements☆2,525Updated 6 months ago
- File upload vulnerability scanner and exploitation tool.☆3,169Updated last year
- A python script that finds endpoints in JavaScript files☆3,824Updated 10 months ago
- BBT - Bug Bounty Tools (examples💡)☆1,743Updated 10 months ago
- "Can I take over XYZ?" — a list of services and how to claim (sub)domains with dangling DNS records.☆5,026Updated last week
- Automated & Manual Wordlists provided by Assetnote☆1,380Updated 6 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆2,794Updated 6 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,240Updated 4 years ago
- XSS payloads designed to turn alert(1) into P1☆1,349Updated last year
- Take a list of domains and probe for working HTTP and HTTPS servers☆2,949Updated 7 months ago
- pwning IPv4 via IPv6☆1,758Updated last year
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,178Updated 2 weeks ago
- Fetch many paths for many hosts - without killing the hosts☆1,625Updated last year
- Mining URLs from dark corners of Web Archives for bug hunting/fuzzing/further probing☆2,617Updated 7 months ago