Oracle Database Penetration Testing Reference (10g/11g)
☆40Jul 28, 2018Updated 7 years ago
Alternatives and similar repositories for Oracle-Pentesting-Reference
Users that are interested in Oracle-Pentesting-Reference are comparing it to the libraries listed below
Sorting:
- Dump elasticsearch instance☆15Jan 7, 2026Updated last month
- 应急响应时收集Windows机器信息☆12Jul 18, 2022Updated 3 years ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Oct 23, 2016Updated 9 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- a tool that gets all paths at robots.txt and opens it in the browser.☆14Aug 2, 2019Updated 6 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- CI Pipeline with Pixi, the WAF OWASP Core Rule Set and TestCafe tests.☆15Jun 9, 2021Updated 4 years ago
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- A variation CredBandit that uses compression to reduce the size of the data that must be trasnmitted.☆19Jun 24, 2021Updated 4 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- Cobalt Strike Malleable Profile Inline Patch Template: A Position Independent Code (PIC) Code Template For Creating Shellcode That Can Be…☆42Sep 3, 2020Updated 5 years ago
- ☆40May 21, 2022Updated 3 years ago
- pentest scripts☆20Jul 28, 2020Updated 5 years ago
- Are you forwarding DNS traffic to another server for some reason, but want to make sure only queries for certain names are passed? Say no…☆20Oct 16, 2022Updated 3 years ago
- ☆36Mar 11, 2019Updated 6 years ago
- A python library to automate time-based blind SQL injection☆49Sep 15, 2019Updated 6 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- ☆39Jul 29, 2021Updated 4 years ago
- Automatic Sender Policy Framework Reconnaissance☆19Jul 9, 2018Updated 7 years ago
- AWS S3 Bucket Finder.☆14Oct 28, 2025Updated 4 months ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- Attempt to connect to and dump all tables within a ServiceNow instance.☆20Jul 4, 2023Updated 2 years ago
- Scripts I have written to perform various IT Security admin tasks. From validating findings to performing automated attacks☆20Mar 12, 2025Updated 11 months ago
- Tools for bug hunting in a container☆21Aug 18, 2023Updated 2 years ago
- CVE-2022-22947 memshell☆18Mar 18, 2022Updated 3 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- Some of my bug bounty tools☆52Oct 23, 2019Updated 6 years ago
- govenom is a msfvenom-inspired cross-platform payload generator toolkit written in Go☆21Sep 9, 2020Updated 5 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Mar 1, 2019Updated 6 years ago
- Strstr with user-supplied needle and filename as a BOF.☆32Sep 27, 2021Updated 4 years ago
- Penetration Testing with Kali Linux☆22Oct 18, 2019Updated 6 years ago
- ☆92Dec 8, 2022Updated 3 years ago