☆14Jul 13, 2020Updated 5 years ago
Alternatives and similar repositories for s4p0
Users that are interested in s4p0 are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- A PoC that uses the DirSync protocol to poll Active Directory for changes☆13Aug 16, 2020Updated 5 years ago
- Office 365 and Exchange domain federation enumeration tool☆13Sep 6, 2023Updated 2 years ago
- Wordlist generator☆16Aug 18, 2020Updated 5 years ago
- XSS explot kit/Blind XSS framework/BurpSuite extension☆49Jun 12, 2020Updated 5 years ago
- ☆19Mar 16, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Sparty - MS Sharepoint and Frontpage Auditing Tool☆32Aug 4, 2014Updated 11 years ago
- CRLFMap is a tool to find HTTP Splitting vulnerabilities☆25Jul 31, 2020Updated 5 years ago
- Extension providing view with filtering capabilities for both complete and incomplete requests from all burp tools.☆25Feb 10, 2022Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Jul 1, 2020Updated 5 years ago
- Denial of Service PoC for CVE-2020-1350 (SIGRed)☆18Jul 16, 2020Updated 5 years ago
- A dump of all the scripts that I make☆19Jul 4, 2021Updated 4 years ago
- Red Teaming Experiments / Offensive Security / OSCP & Pentesting Cheat Sheets and more☆18Jan 11, 2019Updated 7 years ago
- Wireless Pentesting Device☆24Aug 14, 2020Updated 5 years ago
- Tool to automate corporate network segmentation test☆21Aug 6, 2020Updated 5 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- HackerOne Staffs☆29Dec 9, 2019Updated 6 years ago
- Reverse transparent protocol agnostic socks proxy.☆17Jan 14, 2020Updated 6 years ago
- Wordlists for intelligent directory brute-forcing☆33Sep 28, 2021Updated 4 years ago
- rlyCTF (relay CTF) challenge to emulate real-world SSRF attacks.☆10Apr 13, 2019Updated 6 years ago
- ☆26Feb 6, 2026Updated last month
- Financial Applications Features - Security Guidelines (FAFSG) is a set of two FREE checklists created to provide guidelines on the securi…☆12Aug 23, 2021Updated 4 years ago
- Pivoting framework☆16Jun 5, 2016Updated 9 years ago
- OSINT=*, Chrome extension that searches all the threat feeds☆11Dec 5, 2021Updated 4 years ago
- Interactive workshop for using Falco, a security tool in the CNCF☆10Jan 22, 2021Updated 5 years ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Security checks for http headers and cookies☆27Feb 11, 2021Updated 5 years ago
- Generate wordlists for fuzzing API method names☆55Oct 16, 2020Updated 5 years ago
- Automate bug bounty recon using bash alias☆15Aug 6, 2024Updated last year
- UglyEXe - bypass some AVs☆17Feb 28, 2020Updated 6 years ago
- ☆67Dec 19, 2018Updated 7 years ago
- Meeting Manager for Jitsi using Token Auth☆18Aug 2, 2023Updated 2 years ago
- my home's dotfiles☆50Oct 20, 2015Updated 10 years ago
- This BOT retweets everything related to Cyber Security,☆26Jan 20, 2022Updated 4 years ago
- Tmux plugin that adds support for scriptable variables in the status line☆18Feb 1, 2018Updated 8 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆38Nov 8, 2017Updated 8 years ago
- WordPress - Authenticated XXE (CVE-2021-29447)☆43Oct 4, 2021Updated 4 years ago
- A collection of all the lists, scripts and techniques I use while doing web application penetration tests.☆28Feb 29, 2016Updated 10 years ago
- A malicious LDAP server for JNDI injection attacks☆76Nov 15, 2024Updated last year
- This script will generate payloads for basic intrusion detection avoidance. It utilizes publicly demonstrated techniques from several dif…☆34Jun 10, 2018Updated 7 years ago
- Proof of concept for CVE-2020-5902☆72Jul 6, 2020Updated 5 years ago
- ☆41May 16, 2018Updated 7 years ago