lanjelot / kbLinks
All my infosec notes I have been building up over the years
☆336Updated 4 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- ☆265Updated 6 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆436Updated 3 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆354Updated 3 months ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆580Updated 10 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆173Updated last year
- A unique automated LFi Exploiter with Bind/Reverse Shells☆281Updated 10 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- DNS Rebinding Exploitation Framework☆490Updated 4 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆551Updated 2 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆256Updated last month
- Pillage web accessible GIT, HG and BZR repositories☆318Updated 8 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆537Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆287Updated 5 months ago
- Probe a rendering engine for vulnerabilities and other features☆366Updated 3 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆577Updated last year
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆257Updated last year
- Collection of different exploits☆182Updated 4 years ago
- Albatar is a SQLi exploitation framework in Python☆137Updated 5 months ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆563Updated last year
- Enyx SNMP IPv6 Enumeration Tool☆102Updated 2 years ago
- A mini webserver with FTP support for XXE payloads☆331Updated last year
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆403Updated 2 months ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- ☆326Updated 7 years ago
- Windows Pentest Scripts☆231Updated 7 years ago