lanjelot / kb
All my infosec notes I have been building up over the years
☆336Updated 2 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆353Updated 2 months ago
- ☆264Updated 6 years ago
- DNS Rebinding Exploitation Framework☆488Updated 4 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 9 years ago
- BFAC (Backup File Artifacts Checker): An automated tool that checks for backup artifacts that may disclose the web-application's source c…☆548Updated 2 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆256Updated last year
- ☆206Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆180Updated 5 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆575Updated 10 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- A unique automated LFi Exploiter with Bind/Reverse Shells☆278Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Penetration testing scripts☆143Updated 7 years ago
- Explore the network using VPNPivot tool☆270Updated 8 years ago
- Windows Pentest Scripts☆231Updated 7 years ago
- Orc is a post-exploitation framework for Linux written in Bash☆395Updated 5 years ago
- Viewgen is a ViewState tool capable of generating both signed and encrypted payloads with leaked validation keys☆618Updated 3 months ago
- A script that monitors and extracts requested URLs and clients connected to the service by exploiting publicly accessible Apache server-s…☆437Updated 3 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆209Updated 2 years ago
- Github for the scripts utilised during Penetration test☆234Updated 7 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆287Updated 4 months ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆425Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆535Updated 4 years ago
- Local File Inclusion Exploitation Tool (mirror)☆125Updated 8 years ago
- Leverage certificate transparency live feed to monitor for newly issued subdomain certificates (last 90 days, configurable), for domains …☆219Updated 2 years ago
- Utils☆267Updated 9 years ago
- An exploit for Apache Struts CVE-2018-11776☆301Updated 6 years ago
- ☆326Updated 7 years ago
- Panoptic is an open source penetration testing tool that automates the process of search and retrieval of content for common log and conf…☆315Updated 2 weeks ago