lanjelot / kbLinks
All my infosec notes I have been building up over the years
☆336Updated 3 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- ☆264Updated 6 years ago
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆355Updated 3 months ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆199Updated 7 years ago
- Damn Vulnerable Thick Client App☆150Updated 4 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆257Updated 4 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 9 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated 11 months ago
- TheftFuzzer is a tool that fuzzes Cross-Origin Resource Sharing implementations for common misconfigurations.☆315Updated 2 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆255Updated 2 weeks ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 2 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆436Updated 3 years ago
- Collection of different exploits☆182Updated 4 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆287Updated 4 months ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆353Updated 4 years ago
- Notes/Tools for pentesting☆82Updated last year
- kadimus is a tool to check and exploit lfi vulnerability.☆536Updated 4 years ago
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆265Updated 6 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆276Updated 4 years ago
- ZAP/Burp plugin that generate script to reproduce a specific HTTP request (Intended for fuzzing or scripted attacks)☆291Updated 2 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆173Updated last year
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- Red Team Tactics, Techniques, and Procedures☆404Updated 3 months ago
- Code Review Audit Script Scanner☆140Updated last month
- It's bloody scantastic☆237Updated 2 years ago
- Penetration testing scripts☆143Updated 7 years ago