jopraveen / pwnkillerView external linksLinks
☆10Jan 8, 2023Updated 3 years ago
Alternatives and similar repositories for pwnkiller
Users that are interested in pwnkiller are comparing it to the libraries listed below
Sorting:
- Gonna share my writeups and resources here☆72Jan 16, 2025Updated last year
- Collection of pwn techniques☆29Feb 12, 2022Updated 4 years ago
- i3 rice Inspired by Cyberpunk 2077☆39Oct 6, 2021Updated 4 years ago
- OOB listener powered by cloudflare workers☆12Apr 13, 2025Updated 10 months ago
- abuse Pureftpd FXP to obtain the ipv6 of the target server☆11Jun 4, 2021Updated 4 years ago
- Information Security mind map☆15Aug 28, 2021Updated 4 years ago
- Offensive recon with GitHub Actions☆11Aug 25, 2024Updated last year
- Cryptanalysis tool for the Enigma machine☆15Aug 21, 2023Updated 2 years ago
- All the latest releases and files for x64dbg...☆13Nov 23, 2020Updated 5 years ago
- Code samples discussed during DEFCON Red Team Village Talk -- "Yippee-Ki-Yay MFA'er - Bypassing Multi-Factor Authentication with Real-Tim…☆10Jul 29, 2020Updated 5 years ago
- A python script to automatically dump files and source code of a Symfony server in debug mode.☆13Feb 11, 2025Updated last year
- ☆10Aug 9, 2024Updated last year
- ☆12Apr 20, 2025Updated 9 months ago
- Extract LPD/LPR print job(s) from wireshark capture file☆12May 2, 2023Updated 2 years ago
- Small wiki for Mobile Application Penetration Testing Tools☆12Apr 8, 2021Updated 4 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- ☆13Dec 12, 2022Updated 3 years ago
- Top 2025 Vulnerabilities You Shouldn’t Accept in a Pentest Report☆14Feb 6, 2025Updated last year
- Indirect Prompt Injection Methodology (IPIM) - A structured process which security professionals can use to find Indirect Prompt Injectio…☆16Jul 28, 2025Updated 6 months ago
- This tool is designed to seamlessly convert Postman collections into OpenAPI schemas. This conversion is essential for API security testi…☆12Sep 3, 2024Updated last year
- Used to grab banners from TCP services and search their contents for a specific string.☆16Feb 11, 2020Updated 6 years ago
- apkfram was written in order to help any mobile penetration testers to identify the Framework used to develop the Android application.☆12Oct 9, 2024Updated last year
- Vulnerability teaching showcase☆13Apr 19, 2016Updated 9 years ago
- Challenge files☆11Sep 30, 2021Updated 4 years ago
- ☆15Sep 13, 2025Updated 5 months ago
- Odoo 12.0 allows remote attackers to read local files.☆11Jun 11, 2020Updated 5 years ago
- Discord Bot for Realtime Updates from CTFd☆10Jan 10, 2021Updated 5 years ago
- This repository is a collection of notes, links, tutorials, and experiences aimed at helping others. If you find it useful, please consid…☆18Jun 24, 2025Updated 7 months ago
- This website is used to automatically scan files during CTF.☆12May 31, 2023Updated 2 years ago
- Challenges for the TheManyHatsClub CTF☆11May 1, 2023Updated 2 years ago
- A small WinRM client designed for interacting with JEA endpoints.☆13Aug 29, 2024Updated last year
- Remote Code Execution EJS Web Applications using express-fileupload☆11Aug 17, 2021Updated 4 years ago
- Memory mapping profiles for forensic analysis using volatility 2☆53Sep 23, 2022Updated 3 years ago
- A tool to check for response status codes with ease☆13Apr 29, 2023Updated 2 years ago
- A Hash Collision Attack is an attempt to find two input strings of a hash function that produce the same hash result. Because hash functi…☆15Dec 7, 2017Updated 8 years ago
- ☆11Oct 27, 2021Updated 4 years ago
- ☆10Dec 8, 2022Updated 3 years ago
- load mixed assemblies (.NET) C# source code☆14Sep 3, 2017Updated 8 years ago
- ☆14Feb 2, 2022Updated 4 years ago