lanjelot / kbLinks
All my infosec notes I have been building up over the years
☆334Updated 8 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆358Updated 8 months ago
- ☆266Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆260Updated 2 years ago
- DNS Rebinding Exploitation Framework☆493Updated 4 years ago
- Damn Vulnerable Thick Client App☆151Updated 5 years ago
- Linux post exploitation enumeration and exploit checking tools☆182Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆292Updated 6 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆329Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆197Updated 7 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆891Updated 5 years ago
- Pillage web accessible GIT, HG and BZR repositories☆325Updated 8 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆359Updated 5 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆403Updated 6 months ago
- nnposter's alternate fingerprint dataset for Nmap script http-default-accounts☆256Updated this week
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆201Updated 6 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆289Updated 10 months ago
- Code Review Audit Script Scanner☆141Updated last month
- ☆208Updated 4 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆254Updated 3 years ago
- SHELLING - a comprehensive OS command injection payload generator☆111Updated 6 years ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 6 months ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆439Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 3 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
- ☆218Updated 3 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆276Updated 4 years ago
- Collection of different exploits☆182Updated 4 years ago