lanjelot / kbLinks
All my infosec notes I have been building up over the years
☆337Updated 7 months ago
Alternatives and similar repositories for kb
Users that are interested in kb are comparing it to the libraries listed below
Sorting:
- This will assist you in the finding of potentially vulnerable PHP code. Each type of grep command is categorized in the type of vulnerabi…☆356Updated 7 months ago
- ☆266Updated 6 years ago
- Poodle (Padding Oracle On Downgraded Legacy Encryption) attack CVE-2014-3566☆259Updated 2 years ago
- DNS Rebinding Exploitation Framework☆492Updated 4 years ago
- Commodity Injection Signatures, Malicious Inputs, XSS, HTTP Header Injection, XXE, RCE, Javascript, XSLT☆402Updated 5 months ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆290Updated 6 years ago
- Remote root exploit for the SAMBA CVE-2017-7494 vulnerability☆259Updated 4 years ago
- Material for the training "Developing Burp Suite Extensions – From Manual Testing to Security Automation"☆358Updated 4 years ago
- Damn Vulnerable Thick Client App☆151Updated 5 years ago
- Collection of things made during my preparation to take on OSCE☆189Updated 3 years ago
- Linux post exploitation enumeration and exploit checking tools☆181Updated 5 years ago
- Probe a rendering engine for vulnerabilities and other features☆367Updated 3 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆332Updated 2 years ago
- Simple python script to extract unsafe functions from php projects☆196Updated 7 years ago
- Collection of Proof of Concepts and Potential Targets for #ShellShocker☆888Updated 5 years ago
- Windows Pentest Scripts☆233Updated 7 years ago
- ☆208Updated 4 years ago
- Collection of different exploits☆180Updated 4 years ago
- Bad Characters highlighter for exploit development purposes supporting multiple input formats while comparing.☆208Updated 3 years ago
- Pillage web accessible GIT, HG and BZR repositories☆323Updated 8 years ago
- A quick methodology on testing / hacking SAP Applications for n00bz and bug bounty hunters☆253Updated 2 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆275Updated 4 years ago
- This repository includes a set of scripts to install a Burp Collaborator Server in a docker environment, using a LetsEncrypt wildcard cer…☆290Updated 8 months ago
- A collection of useful Serverless functions I use when pentesting☆389Updated 2 years ago
- Code Review Audit Script Scanner☆141Updated 5 months ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆259Updated 4 months ago
- Explore the network using VPNPivot tool☆273Updated 9 years ago
- udp-proto-scanner is a Perl script which discovers UDP services by sending triggers to a list of hosts☆100Updated last year
- A scripted pipeline of tools to streamline the bug bounty/penetration test reconnaissance phase, so you can focus on chomping bugs.☆397Updated 5 years ago
- Internal penetration testing tool for Linux that can be used to enumerate OS information, domain information, shares, directories, and us…☆579Updated last year