lanjelot / kb
All my infosec notes I have been building up over the years
☆333Updated 2 months ago
Alternatives and similar repositories for kb:
Users that are interested in kb are comparing it to the libraries listed below
- ☆265Updated 6 years ago
- Linux post exploitation enumeration and exploit checking tools☆179Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆246Updated 9 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 10 months ago
- Pillage web accessible GIT, HG and BZR repositories☆317Updated 8 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆353Updated last month
- A unique automated LFi Exploiter with Bind/Reverse Shells☆278Updated 9 years ago
- DNS Rebinding Exploitation Framework☆489Updated 3 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆532Updated 4 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆286Updated 3 months ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆435Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆352Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 2 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 10 months ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆398Updated this week
- Post Exploitation Wiki☆518Updated 5 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- CMS/LMS/Library etc Versions Fingerprinter☆258Updated 3 years ago
- Windows Pentest Scripts☆230Updated 7 years ago
- Search Exploitable Software on Linux☆227Updated 2 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆396Updated 5 years ago
- Enumerating IPs in X-Forwarded-Headers to bypass 403 restrictions☆221Updated 3 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- An SNMPv3 User Enumerator and Attack tool☆253Updated 4 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆314Updated 3 years ago
- Notes/Tools for pentesting☆82Updated last year