lanjelot / kbLinks
All my infosec notes I have been building up over the years
☆336Updated 6 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- ☆265Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆257Updated last year
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 5 months ago
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Damn Vulnerable Thick Client App☆150Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆405Updated 4 months ago
- DNS Rebinding Exploitation Framework☆492Updated 4 years ago
- Simple python script to extract unsafe functions from php projects☆200Updated 7 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- Penetration testing scripts☆145Updated 7 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆211Updated 2 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆252Updated 2 years ago
- Collection of different exploits☆182Updated 4 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆578Updated last year
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆356Updated 4 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 5 years ago
- Pillage web accessible GIT, HG and BZR repositories☆321Updated 8 years ago
- Search Exploitable Software on Linux☆231Updated 2 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- ☆207Updated 4 years ago
- ☆219Updated 3 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆427Updated 5 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆277Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆436Updated 3 years ago