horshark / akb-explorerLinks
A command line tool to search AttackerKB.
☆52Updated 4 years ago
Alternatives and similar repositories for akb-explorer
Users that are interested in akb-explorer are comparing it to the libraries listed below
Sorting:
- Showcase of DNS Exfiltration and Infiltration☆48Updated 4 years ago
- Reconnaissance and Enumeration automation script☆53Updated 4 years ago
- BurpSuite using the document and some extensions☆69Updated 5 years ago
- 👹☆56Updated 3 years ago
- This repository is intended for sharing files/tools/tutorials..etc that related to eCPPTv2 from eLearnSecurity☆63Updated 5 years ago
- A set of recipes useful in pentesting and red teaming scenarios☆145Updated 2 years ago
- A Linux enumeration script for Hack The Box☆191Updated 5 years ago
- OSCP guide and Red Team assessment Guide☆35Updated 5 years ago
- This lab is created to demonstrate pass-the-hash, blind sql and SSTI vulnerabilities☆92Updated 2 years ago
- ☆82Updated 5 years ago
- Parse .nessus file(s) and shows output in interactive UI☆155Updated 3 months ago
- parse nmap files☆151Updated 2 months ago
- ☆104Updated 5 years ago
- m0chan.github.io☆85Updated 4 years ago
- This tool compares a targets patch levels against the Microsoft vulnerability database in order to detect potential missing patches on th…☆43Updated last year
- A CLI tool to identify the hash type of a given hash.☆112Updated 2 years ago
- Simple script to generate commands to achieve reverse shells.☆120Updated 4 years ago
- A python based blind SQL injection exploitation script☆136Updated 5 years ago
- Umbraco CMS 7.12.4 - (Authenticated) Remote Code Execution☆75Updated 4 years ago
- This is a walkthrough about understanding the #BoF machine present in the #OSCP exam.☆64Updated 4 years ago
- Windows privilege escalation (enumeration) script designed with OSCP labs (legacy Windows) in mind☆60Updated 6 years ago
- OSWE Preparation☆37Updated 6 years ago
- Damn Vulnerable WordPress Site☆52Updated 2 years ago
- ☆29Updated 5 years ago
- A structured, actionable penetration testing methodology and checklist covering end-to-end engagement phases.☆19Updated this week
- Reverse Shell-able Windows exploits short POCs.☆31Updated 4 years ago
- Automatic Service Enumeration Script☆227Updated 2 years ago
- ☆31Updated 4 years ago
- A simple Markdown checklist for Penetration Testing with Kali Linux 2020 course exercises as part of OSCP.☆63Updated 5 years ago
- ☆150Updated 2 years ago