Oracle Database Penetration Testing Reference (10g/11g)
☆40Jul 28, 2018Updated 7 years ago
Alternatives and similar repositories for Oracle-Pentesting-Reference
Users that are interested in Oracle-Pentesting-Reference are comparing it to the libraries listed below
Sorting:
- Docker Pentest Lists are collection of Dockerfiles or Links to Dockerfiles for containers used in Penetration Tests☆21May 1, 2017Updated 8 years ago
- webfuck chrome extension☆18Feb 16, 2017Updated 9 years ago
- Password obfuscator for vpnc config files (beware that passwords can be deobfuscated using cisco-decrypt!!!)☆10Mar 19, 2020Updated 6 years ago
- This extension replaces the default repeater tab name with the URL path of the repeater request.☆24Sep 3, 2021Updated 4 years ago
- Dump elasticsearch instance☆15Jan 7, 2026Updated 2 months ago
- CTF Writeups☆12Feb 25, 2023Updated 3 years ago
- Wordlists for Bug Bounty☆23Aug 18, 2019Updated 6 years ago
- ☆13Apr 8, 2022Updated 3 years ago
- pentest scripts☆20Jul 28, 2020Updated 5 years ago
- Extract (links/possible endpoints) from responses & filter them via decoding/sorting☆93Aug 27, 2019Updated 6 years ago
- Android application penetration testing for the masses.☆13Apr 12, 2019Updated 6 years ago
- Automated iOS Frida Gadget injection and Testflight deployment using Frida and Fastlane☆14Mar 24, 2023Updated 2 years ago
- 应急响应时收集Windows机器信息☆12Jul 18, 2022Updated 3 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- x86 emulator by Golang☆13Jun 29, 2017Updated 8 years ago
- Customizable Security Scanner written in Go☆16Jul 6, 2016Updated 9 years ago
- Exploit of the way update plugins works in Webmin, used to gain access to whatever Webmin is being run as (normally root). Written by mem…☆12Nov 15, 2019Updated 6 years ago
- ☆20Jul 2, 2021Updated 4 years ago
- Misc. Public Reports of Penetration Testing and Security Audits.☆35Jan 8, 2021Updated 5 years ago
- Demo of various ways to exploit post based reflected XSS☆18Jul 6, 2023Updated 2 years ago
- Some stuff for CTF.☆10Oct 27, 2019Updated 6 years ago
- ☆11Jun 19, 2024Updated last year
- How to set up a local copy of Have-I-Been-Pwned's password checking service☆21Aug 19, 2021Updated 4 years ago
- Kernel exploitation challenge(s) I prepared for the r2con 2019 CTF.☆22Oct 20, 2019Updated 6 years ago
- ☆17Aug 3, 2021Updated 4 years ago
- Vampire is an aggressor script which integrates with BloodHound to mark nodes as owned.☆79Apr 6, 2021Updated 4 years ago
- ☆20Apr 21, 2020Updated 5 years ago
- A small collection of scripts I use when reversing mobile applications.☆21May 1, 2020Updated 5 years ago
- CVE-2022-22947 memshell☆19Mar 18, 2022Updated 4 years ago
- An Android SSL Pinning Remover tool for Security research and Bug Bounty☆43Jun 1, 2023Updated 2 years ago
- A Tool to Extract Open Kibana Instances on Internet and Map them to their Corresponding Organizations for Bug Bounty.☆16Sep 7, 2019Updated 6 years ago
- DO NOT USE: this is a vulnerable ASP.NET web app using Razor templating engine. The vulnerability is a Server-Side Template Injection (SS…☆28Aug 22, 2020Updated 5 years ago
- works but not work, cao!☆24Sep 4, 2021Updated 4 years ago
- Analyze Android native `.so` files☆120Jul 28, 2025Updated 7 months ago
- DNS File EXfiltration☆45Apr 12, 2024Updated last year
- A collection of wordlists to use with privilege escalation and password cracking tasks☆14Feb 13, 2024Updated 2 years ago
- Collection of scripts for use with Carbon Black Cb Response API☆14May 7, 2022Updated 3 years ago
- Utilizing your Threat data from a MISP instance into CarbonBlack Response by exposing the data in the Threat Intelligence Feed.☆20May 25, 2022Updated 3 years ago
- ☆36Mar 11, 2019Updated 7 years ago