RabbitMQ exploit and Pentesting guide for penetration tester
☆20Nov 22, 2023Updated 2 years ago
Alternatives and similar repositories for RabbitMQ-Pentesting
Users that are interested in RabbitMQ-Pentesting are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Offensive tool for guessing Active Directory credentials via Kerberos☆10Jan 1, 2024Updated 2 years ago
- IoT CVEs as abnormal events to evaluate a real-time host-based IDS. https://doi.org/10.1016/j.future.2022.03.001☆13Mar 16, 2022Updated 4 years ago
- Experiments with eBPF bytecode☆16Jul 17, 2025Updated 8 months ago
- My experiments in weaponizing ONOS applications (https://github.com/opennetworkinglab/onos)☆20Nov 10, 2024Updated last year
- A automate link building tool perfect for front-end development☆13Oct 2, 2017Updated 8 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- A React-Native library to detect if frida server is running or not.☆42Mar 3, 2026Updated 3 weeks ago
- XSS in pastebin.com and reddit.com via unsanitized markdown output☆88Apr 24, 2018Updated 7 years ago
- //: A simple brainfuck compiler for x86_64-linux in c.☆19Nov 8, 2022Updated 3 years ago
- ☆13Nov 3, 2023Updated 2 years ago
- A simple tool helps CTFpwner deal with protobuf ELF, reverses proto structure and generates ".proto" files.☆20May 12, 2025Updated 10 months ago
- Scrape files for sensitive information, and generate an interactive HTML report. Based on Rabin2.☆17Feb 25, 2026Updated last month
- Utility to pull disclosed vulnerabilities from HackerOne private programs - for personal use only☆13Aug 22, 2021Updated 4 years ago
- Offensive Security Vault structure for Obsidian☆24Jan 9, 2023Updated 3 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- A small Python-Script to extract NetNTLMv2 Hashes from NTMLssp-HTTP-Authentications, which were captured in a pcap.☆25Mar 5, 2023Updated 3 years ago
- Free Online Certifications in CyberSecurity☆14Apr 17, 2021Updated 4 years ago
- A bash tool used to install famous bug bounty tools. Mainly used when setting up a fresh environment.☆16Mar 20, 2023Updated 3 years ago
- ☆16May 3, 2021Updated 4 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆30Nov 9, 2022Updated 3 years ago
- Example of running C3 (https://github.com/FSecureLABS/C3) in a Docker container☆27Oct 24, 2021Updated 4 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 3 years ago
- Generate link previews from the command line (macOS)☆23Nov 29, 2025Updated 3 months ago
- This repository provides a dockerized infrastructure and a python implementation of the CVE-2019-11043 exploit.☆14May 25, 2020Updated 5 years ago
- DigitalOcean Gradient AI Platform • AdBuild production-ready AI agents using customizable tools or access multiple LLMs through a single endpoint. Create custom knowledge bases or connect external data.
- Passive JavaScript reconnaissance for penetration testers — bridging Burp Suite traffic into structured, AST-based analysis in VSCode.☆36Feb 5, 2026Updated last month
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- ☆17Oct 9, 2024Updated last year
- Get 10k subdomains in securitytrails using cookie without apikey.☆37Oct 23, 2025Updated 5 months ago
- Fast Rust library for PDF inspection, classification, and text extraction. Intelligently detects scanned vs text-based PDFs to enable sma…☆49Updated this week
- 🛡️ The Ultimate Cybersecurity Library | 160+ curated books, guides & resources covering Ethical Hacking, Penetration Testing, Bug Bounty…☆50Mar 5, 2026Updated 3 weeks ago
- ☆13Oct 24, 2024Updated last year
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆31Nov 10, 2024Updated last year
- Grab form parameters easily☆14Dec 11, 2024Updated last year
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- Enumerate Callbacks and all Object Types☆16Jan 9, 2023Updated 3 years ago
- Collection of scripts to Invoke an expression with different credentials.☆35Jun 2, 2021Updated 4 years ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- ☆48Oct 1, 2025Updated 5 months ago
- ☆15May 8, 2025Updated 10 months ago
- A structured fuzzing framework built in Rust☆31Oct 10, 2022Updated 3 years ago
- A tool to generate malicious .deb files☆18Mar 6, 2018Updated 8 years ago