lanjelot / kbLinks
All my infosec notes I have been building up over the years
☆333Updated 8 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 7 months ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆259Updated 2 years ago
- ☆266Updated 6 years ago
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆330Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Damn Vulnerable Thick Client App☆151Updated 5 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆292Updated 6 years ago
- DNS Rebinding Exploitation Framework☆493Updated 4 years ago
- Pillage web accessible GIT, HG and BZR repositories☆323Updated 8 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆438Updated 4 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆254Updated 3 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆358Updated 5 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆402Updated 6 months ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆890Updated 5 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 4 years ago
- Collection of different exploits☆182Updated 4 years ago
- A collection of useful Serverless functions I use when pentesting☆390Updated 2 years ago
- Penetration testing scripts☆145Updated 7 years ago
- A set of tools made to assist in penetration testing GWT applications. Additional details about these tools can be found on my OWASP Apps…☆237Updated 5 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆202Updated 6 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆289Updated 9 months ago
- Code Review Audit Script Scanner☆141Updated 2 weeks ago
- Windows Pentest Scripts☆233Updated 7 years ago
- An SNMPv3 User Enumerator and Attack tool☆257Updated 5 years ago
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Updated 5 years ago
- Python3 Burp History parsing tool to discover potential SQL injection points. To be used in tandem with SQLmap.☆469Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆575Updated last year