lanjelot / kb
All my infosec notes I have been building up over the years
☆328Updated 3 years ago
Related projects ⓘ
Alternatives and complementary repositories for kb
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆346Updated 6 years ago
- ☆259Updated 5 years ago
- Local UNIX PrivEsc Aggregation☆245Updated 8 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Linux post exploitation enumeration and exploit checking tools☆176Updated 4 years ago
- DNS Rebinding Exploitation Framework☆482Updated 3 years ago
- From XSS to RCE 2.75 - Black Hat Europe Arsenal 2017 + Extras☆423Updated 4 years ago
- Modified version of the passing-the-hash tool collection made to work straight out of the box☆559Updated 9 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆256Updated 3 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆253Updated 5 months ago
- Windows Pentest Scripts☆226Updated 6 years ago
- Post Exploitation Wiki☆514Updated 4 years ago
- ☆207Updated 3 years ago
- CryptOMG is a configurable CTF style test bed that highlights common flaws in cryptographic implementations.☆191Updated 9 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆203Updated 2 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆568Updated 5 months ago
- Notes/Tools for pentesting☆83Updated 11 months ago
- Explore the network using VPNPivot tool☆268Updated 8 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆390Updated 4 months ago
- kadimus is a tool to check and exploit lfi vulnerability.☆514Updated 4 years ago
- Search Exploitable Software on Linux☆222Updated last year
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆167Updated 9 months ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆270Updated 3 years ago
- A collection of curated Java Deserialization Exploits☆590Updated 3 years ago
- Local File Inclusion Exploitation Tool (mirror)☆122Updated 7 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆267Updated 9 years ago
- Enyx SNMP IPv6 Enumeration Tool☆102Updated last year
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆251Updated last year
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated last year
- Damn Vulnerable Hybrid Mobile App (DVHMA) is an hybrid mobile app (for Android) that intentionally contains vulnerabilities.☆257Updated 6 years ago