lanjelot / kb
All my infosec notes I have been building up over the years
☆333Updated last month
Alternatives and similar repositories for kb:
Users that are interested in kb are comparing it to the libraries listed below
- Local UNIX PrivEsc Aggregation☆246Updated 8 years ago
- ☆264Updated 6 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 4 years ago
- Search Exploitable Software on Linux☆226Updated last year
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated last year
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Post Exploitation Wiki☆516Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆573Updated 9 months ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆571Updated 10 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆528Updated 4 years ago
- ReverShellGenerator - A tool to generate various ways to do a reverse shell☆560Updated 10 months ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆350Updated 3 weeks ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 4 years ago
- Explore the network using VPNPivot tool☆269Updated 8 years ago
- Windows Pentest Scripts☆229Updated 7 years ago
- Collection of things made during my preparation to take on OSCE☆188Updated 3 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆284Updated 2 months ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆434Updated 3 years ago
- Local File Inclusion Exploitation Tool (mirror)☆123Updated 8 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆275Updated 9 years ago
- fimap is a little python tool which can find, prepare, audit, exploit and even google automatically for local and remote file inclusion b…☆534Updated 2 years ago
- Red Team Tactics, Techniques, and Procedures☆398Updated last month
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 9 months ago
- ☆206Updated 4 years ago
- Tricks for penetration testing☆574Updated 4 years ago
- Basics of Windows privilege escalation☆133Updated 7 years ago
- Notes/Tools for pentesting☆81Updated last year