Oracle Database Penetration Testing Reference (10g/11g)
☆40Jul 28, 2018Updated 7 years ago
Alternatives and similar repositories for Oracle-Pentesting-Reference
Users that are interested in Oracle-Pentesting-Reference are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 6 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Dump elasticsearch instance☆15Jan 7, 2026Updated 3 months ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click. Zero configuration with optimized deployments.
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 4 years ago
- pentest scripts☆20Jul 28, 2020Updated 5 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- Android application penetration testing for the masses.☆14Apr 12, 2019Updated 7 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 3 years ago
- 应急响应时收集Windows机器信息☆12Jul 18, 2022Updated 3 years ago
- cve-2018-2894 不同别人的利用方法。☆15Dec 1, 2025Updated 5 months ago
- ☆15May 31, 2023Updated 2 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆37Jan 8, 2021Updated 5 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- A simple webhook server☆12May 25, 2021Updated 4 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- ☆11Jun 19, 2024Updated last year
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 6 months ago
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- GPU virtual machines on DigitalOcean Gradient AI • AdGet to production fast with high-performance AMD and NVIDIA GPUs you can spin up in seconds. The definition of operational simplicity.
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 5 years ago
- ☆20Apr 21, 2020Updated 6 years ago
- A small collection of scripts I use when reversing mobile applications.☆21May 1, 2020Updated 5 years ago
- CVE-2022-22947 memshell☆19Mar 18, 2022Updated 4 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- Deploy to Railway using AI coding agents - Free Credits Offer • AdUse Claude Code, Codex, OpenCode, and more. Autonomous software development now has the infrastructure to match with Railway.
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- DNS File EXfiltration☆45Apr 12, 2024Updated 2 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- ☆36Mar 11, 2019Updated 7 years ago
- Ansible playbooks for instrumenting a Red Team environment with RedElk☆52Oct 6, 2020Updated 5 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆25Mar 1, 2019Updated 7 years ago