☆16Dec 16, 2021Updated 4 years ago
Alternatives and similar repositories for log4jake
Users that are interested in log4jake are comparing it to the libraries listed below
Sorting:
- Vulnerable Windows Application☆18Nov 27, 2023Updated 2 years ago
- CloudSec Tools is a curated collection of open-source cloud security tools, helping security professionals, researchers, and engineers fi…☆21Feb 19, 2026Updated last week
- Burp Suite DAST Power Tools☆22May 1, 2025Updated 10 months ago
- Spring Framework RCE (Quick pentest notes)☆17Apr 7, 2022Updated 3 years ago
- Quick and dirty PowerShell script to abuse the overly permissive capabilities of the SYSTEM user in a child domain on the Public Key Serv…☆29Jul 25, 2023Updated 2 years ago
- Simple script realizado en bash, para revisión de múltiples hosts para CVE-2022-1388 (F5)☆25May 5, 2022Updated 3 years ago
- At this repo you can find any tools, tricks or templates for general penetration testing assesment☆15Apr 27, 2024Updated last year
- ☆15Mar 21, 2025Updated 11 months ago
- POC code to explore phishing attacks using OAuth 2.0 authorization flows, such as the device authorization grant.☆35Aug 7, 2021Updated 4 years ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆33Nov 8, 2021Updated 4 years ago
- 四万多条规则,不含广告过滤,避免误杀,内含PAYPAL,TIKTOK,TELEGRAM,YOUTUBE,STREAMING (包含迪士尼奈飞亚马逊等流媒体),WEIBO分组规则,需要自己手动在小火箭里面-全局路由-分组-添加分组,需要以上哪个分组添加哪个,没添加的默认走PR…☆13Feb 4, 2023Updated 3 years ago
- ☆11Oct 10, 2020Updated 5 years ago
- The Ultimate Recon Framework☆11Mar 29, 2024Updated last year
- ll In One Tool For Info Gathering, SQL Vulnerability Scannig and Crawling☆13Jun 10, 2017Updated 8 years ago
- Turn your VPS into an attack box☆34Mar 17, 2024Updated last year
- Ultra-fast TCP port discovery engine with Nmap orchestration☆23Dec 8, 2025Updated 2 months ago
- web information gathering / Grab links☆45Nov 1, 2019Updated 6 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆100Sep 9, 2023Updated 2 years ago
- Default locations for files on various Linux distros.☆10May 12, 2021Updated 4 years ago
- ☆21Dec 4, 2014Updated 11 years ago
- ☆16Updated this week
- A tool to do basic fingerprinting across a large number of hosts☆11Oct 20, 2020Updated 5 years ago
- ☆11Apr 21, 2022Updated 3 years ago
- Collection of all the resources published by Payatu.☆11Aug 11, 2025Updated 6 months ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆10Oct 2, 2022Updated 3 years ago
- Recon for Pentesting and BugBounty 🕵️☆14Jan 14, 2026Updated last month
- BloodHound Automation: Collection, Analysis and Data Import☆19Nov 12, 2025Updated 3 months ago
- ☆13Jun 26, 2025Updated 8 months ago
- A script to build a Docker image for a DNN Platform website☆10Feb 8, 2018Updated 8 years ago
- a recon framework that facilitates discovering, scanning and monitoring assets trough a configurable engine running on serverless aws inf…☆12Aug 26, 2024Updated last year
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Feb 23, 2022Updated 4 years ago
- ☆14Jun 27, 2024Updated last year
- Collection of rules for Static Application Security Testing (SAST) with Semgrep☆12Apr 16, 2025Updated 10 months ago
- ☆11Jan 18, 2023Updated 3 years ago
- this repository is a base so everyone can modify it according to there thoughts and process used☆10Jun 9, 2021Updated 4 years ago
- Web shell as Portlet (useful for Websphere Portal, JBoss Portal, etc.)☆12Aug 27, 2016Updated 9 years ago
- A purple team oriented cyber range deployed in AWS with Terraform☆12Jun 8, 2020Updated 5 years ago
- Welcome to the Very Vulnerable Lambda Application repository! This repository contains an intentionally vulnerable serverless applicatio…☆11Jul 22, 2024Updated last year
- A vulnerable Cognito application is a simple web app that can be used to practice various Cognito attacks.☆12Jul 13, 2022Updated 3 years ago