payatu / ivr-pentest
☆15Updated 7 years ago
Related projects ⓘ
Alternatives and complementary repositories for ivr-pentest
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- Journey to conquer the OSCP!☆13Updated 5 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- PHP tool to test XSS☆23Updated 5 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- ☆20Updated 5 years ago
- ☆12Updated 6 years ago
- Vulnerability Scanner☆12Updated 9 years ago
- Scripts for OSCE☆18Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Ansible module for OWASP ZAP using Python API to scan web targets for security issues☆14Updated 6 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆29Updated 6 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 3 years ago
- Shock the shell! Exploit many injection method for shellshock☆17Updated 6 years ago
- This is a beginner level session to train you into using SSH more effectively. While pentesters may benefit (especially if they are plan…☆15Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 6 years ago
- A tool to run nmap against each line in a script.☆16Updated 3 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 11 years ago
- Hacking Wordlist collections for password cracking are attached in the below files☆16Updated 6 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- Personal blog about security, exploitation, CTFs, ...☆21Updated 5 years ago