horshark / akb-explorerLinks
A command line tool to search AttackerKB.
β52Updated 4 years ago
Alternatives and similar repositories for akb-explorer
Users that are interested in akb-explorer are comparing it to the libraries listed below
Sorting:
- Reconnaissance and Enumeration automation scriptβ53Updated 4 years ago
- πΉβ56Updated 4 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilitiesβ90Updated 2 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.β65Updated 4 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Executionβ75Updated 4 years ago
- β83Updated 5 years ago
- A set of recipes useful in pentesting and red teaming scenariosβ144Updated 2 years ago
- m0chan.github.ioβ88Updated last month
- BurpSuite using the document and some extensionsβ70Updated 5 years ago
- A Linux enumeration script for Hack The Boxβ190Updated 5 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on thβ¦β47Updated 2 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mindβ60Updated 6 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurityβ63Updated 5 years ago
- OSWE Preparationβ37Updated 6 years ago
- A python based blind SQL injection exploitation scriptβ140Updated 5 years ago
- OSCP guide and Red Team assessment Guideβ35Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.β19Updated 3 weeks ago
- β31Updated 5 years ago
- Damn Vulnerable WordPress Siteβ51Updated 2 years ago
- Nmap Log4Shell NSE script for discovery Apache Log4j RCE (CVE-2021-44228)β79Updated 3 years ago
- Showcase of DNS Exfiltration and Infiltrationβ51Updated 4 years ago
- A Repository dedicated to creating modular and automated penetration testing frameworks utilizing Jupyter Notebooksβ148Updated 4 years ago
- All the common commands used in a red teaming operation or CTF. This is a work in progress and will be updated with time.β42Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.β56Updated 5 years ago
- A cheat sheet that contains common enumeration and attack methods for Windows Active Directory.β50Updated 5 years ago
- A Google/Bing Scraping tool for LinkedInβ93Updated 2 years ago
- Find the remote website version based on a git repositoryβ125Updated 4 years ago
- Reverse Shell-able Windows exploits short POCs.β32Updated 5 years ago
- β45Updated last year
- parse nmap filesβ155Updated 4 months ago