☆26Jul 12, 2023Updated 2 years ago
Alternatives and similar repositories for Pentest_checklist
Users that are interested in Pentest_checklist are comparing it to the libraries listed below
Sorting:
- Malaysia Elite Hacker Team☆11Jan 29, 2025Updated last year
- Security Advisories☆11Sep 22, 2019Updated 6 years ago
- ☆10Aug 6, 2019Updated 6 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- Simple python script for AD enumeration☆31Apr 5, 2021Updated 4 years ago
- C# Situational Awareness Script☆34Apr 26, 2019Updated 6 years ago
- a Modular web penetration testing interface☆15Feb 20, 2026Updated last week
- impersonate trustedinstaller by fiddling with tokens☆17Aug 30, 2021Updated 4 years ago
- An execute-assembly compatible tool for spraying local admin hashes on an Active Directory domain.☆18Apr 30, 2021Updated 4 years ago
- Workflow for pentesting web applications.☆21Feb 19, 2019Updated 7 years ago
- The official exploit for Open-AudIT v3.3.1 Remote Code Execution CVE-2020-12078☆18Apr 28, 2020Updated 5 years ago
- CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run co…☆16Jun 10, 2019Updated 6 years ago
- Everything related to Cobalt Strike☆15Feb 3, 2020Updated 6 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Apr 7, 2020Updated 5 years ago
- C++ code review checklist.☆17Aug 21, 2017Updated 8 years ago
- Sample Vulnerable and Secure Code Snippets for Various Vulnerabilities☆23Jun 18, 2024Updated last year
- ☆21Dec 1, 2021Updated 4 years ago
- Gmail Enumeration using a glitch described here https://blog.0day.rocks/abusing-gmail-to-get-previously-unlisted-e-mail-addresses-41544b6…☆28Aug 4, 2022Updated 3 years ago
- ☆23Jul 16, 2022Updated 3 years ago
- ESXi Cyber Security Incident Response Script☆25Sep 4, 2024Updated last year
- Enhanced QDLink without handbreak detection and many other restrictions.☆11Apr 13, 2023Updated 2 years ago
- Ansible role to install Cobalt Strike and optionally configure as Teamserver☆33Mar 17, 2021Updated 4 years ago
- web cache poison - Top 1 web hacking technique of 2019☆25Feb 24, 2020Updated 6 years ago
- A project to replicate the functionality of Noah Powers' ServerSetup script, but with error handling and fixed Namecheap API support.☆33Oct 1, 2021Updated 4 years ago
- Implementation of SpoolSample without rDLL☆29Sep 28, 2020Updated 5 years ago
- 就是一个练习RMI反序列化的最简单环境☆30Jan 8, 2022Updated 4 years ago
- ☆33May 11, 2021Updated 4 years ago
- LazyWeb is a demonstration web application designed to showcase common server-side application vulnerabilities. Each vulnerability is cat…☆117Feb 16, 2025Updated last year
- Unauthenticated RCE at Woody Ad Snippets / CVE-2019-15858 (PoC)☆32Apr 25, 2023Updated 2 years ago
- Files of Learn Object Oriented PHP while building a secure & scalable authentication system with validation & database handling.☆10Nov 1, 2017Updated 8 years ago
- My doodles as I learn C#☆76Sep 6, 2020Updated 5 years ago
- Burp extension that checks application requests and responses for indicators of vulnerability or targets for attack☆41Dec 23, 2022Updated 3 years ago
- ☆37Jun 27, 2020Updated 5 years ago
- DLL Hijacking and Mock directories technique to bypass Windows UAC security feature and getting high-level privileged reverse shell. Secu…☆43May 18, 2024Updated last year
- ☆42Dec 22, 2020Updated 5 years ago
- Host Header Injection Checker☆84Mar 2, 2022Updated 4 years ago
- Basic implementation of certstream to print new subdomains and domains☆36Jul 6, 2021Updated 4 years ago
- DragonForceWebshell☆42Oct 30, 2025Updated 4 months ago
- A Collection of Proof of Concepts for non-published Web Exploits and Common CVEs☆10Nov 29, 2020Updated 5 years ago