gquere / pwn_jenkinsLinks
Notes about attacking Jenkins servers
☆2,088Updated last year
Alternatives and similar repositories for pwn_jenkins
Users that are interested in pwn_jenkins are comparing it to the libraries listed below
Sorting:
- Automatic SSRF fuzzer and exploitation tool☆3,416Updated 3 months ago
- Burp Bounty (Scan Check Builder in BApp Store) is a extension of Burp Suite that allows you, in a quick and simple way, to improve the ac…☆1,758Updated last year
- 🎯 XML External Entity (XXE) Injection Payload List☆1,277Updated last year
- Smuggler - An HTTP Request Smuggling / Desync testing tool written in Python 3☆2,038Updated last year
- SSRF (Server Side Request Forgery) testing resources☆2,475Updated last year
- A curated list of amazingly awesome Burp Extensions☆3,322Updated 9 months ago
- Turbo Intruder is a Burp Suite extension for sending large numbers of HTTP requests and analyzing the results.☆1,678Updated last week
- The Swiss Army knife for automated Web Application Testing☆2,308Updated last year
- Totally Automatic LFI Exploiter (+ Reverse Shell) and Scanner☆1,892Updated 3 years ago
- linuxprivchecker.py -- a Linux Privilege Escalation Check Script☆1,750Updated 3 years ago
- File upload vulnerability scanner and exploitation tool.☆3,281Updated 7 months ago
- A tool to perform Kerberos pre-auth bruteforcing☆3,146Updated last year
- ☆1,163Updated 2 months ago
- List of XSS Vectors/Payloads☆1,344Updated 11 months ago
- ☆2,300Updated last year
- Red Teaming & Pentesting checklists for various engagements☆2,625Updated 4 months ago
- ezXSS is an easy way for penetration testers and bug bounty hunters to test (blind) Cross Site Scripting.☆2,195Updated last month
- Windows / Linux Local Privilege Escalation Workshop☆2,028Updated 3 years ago
- The Prime Cross Site Request Forgery (CSRF) Audit and Exploitation Toolkit.☆1,255Updated 10 months ago
- This Lab contain the sample codes which are vulnerable to Server-Side Request Forgery attack☆742Updated 2 years ago
- latest version of scanners for IIS short filename (8.3) disclosure vulnerability☆1,599Updated 2 years ago
- Proof-of-Concept exploits for CVEs found by the team at Rhino Security Labs☆880Updated 6 months ago
- This is a collection of writeups, cheatsheets, videos, books related to SSRF in one single location☆1,346Updated 4 years ago
- Automated & Manual Wordlists provided by Assetnote☆1,567Updated last week
- Next-Generation Linux Kernel Exploit Suggester☆1,945Updated 2 years ago
- XSS payloads designed to turn alert(1) into P1☆1,378Updated 2 years ago
- The dynamic infrastructure framework for everybody! Distribute the workload of many different scanning tools with ease, including nmap, f…☆4,311Updated last year
- pwning IPv4 via IPv6☆1,864Updated last year
- Subdomain Takeover tool written in Go☆2,011Updated 2 years ago
- This script is intended to automate your reconnaissance process in an organized fashion☆2,002Updated 4 years ago