gquere / pwn_jenkinsLinks
Notes about attacking Jenkins servers
☆2,079Updated last year
Alternatives and similar repositories for pwn_jenkins
Users that are interested in pwn_jenkins are comparing it to the libraries listed below
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,346Updated last month
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,017Updated last year
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,750Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,286Updated 7 months ago
- SSRF (Server Side Request Forgery) testing resources☆2,436Updated 11 months ago
- 🎯 XML External Entity (XXE) Injection Payload List☆1,211Updated last year
- The Swiss Army knife for automated Web Application Testing☆2,293Updated last year
- List of XSS Vectors/Payloads☆1,330Updated 9 months ago
- ☆2,287Updated last year
- Subdomain Takeover tool written in Go☆2,003Updated 2 years ago
- ☆1,376Updated last month
- Automated & Manual Wordlists provided by Assetnote☆1,533Updated last week
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,650Updated 2 weeks ago
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,869Updated 3 years ago
- ☆1,193Updated 3 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,572Updated 2 years ago
- Generates permutations, alterations and mutations of subdomains and then resolves them☆2,444Updated 8 months ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,717Updated 3 years ago
- ☆1,144Updated this week
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,131Updated last month
- ☆1,010Updated 3 years ago
- XSS payloads designed to turn alert(1) into P1☆1,379Updated 2 years ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,325Updated 4 years ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,073Updated last year
- Server-Side Template Injection and Code Injection Detection and Exploitation Tool☆4,037Updated last year
- File upload vulnerability scanner and exploitation tool.☆3,263Updated 4 months ago
- Rockyou for web fuzzing☆2,905Updated last month
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆739Updated 2 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,240Updated 8 months ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,288Updated last year