payatu / ivr-pentest
☆16Updated 7 years ago
Alternatives and similar repositories for ivr-pentest:
Users that are interested in ivr-pentest are comparing it to the libraries listed below
- Advanced Infrastructure Penetration Testing, published by Packt☆28Updated 2 years ago
- Tools for auditing WAFS☆18Updated 2 years ago
- PHP tool to test XSS☆23Updated 5 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- LyncSniper: A tool for penetration testing Skype for Business and Lync deployments☆9Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019☆22Updated 5 years ago
- Hand list of Powershell commands frequently used during penetration tests☆14Updated 6 years ago
- Check for .net padding oracle patch☆19Updated 6 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 5 years ago
- A tool to speed up Android pentesting by automating the APK acquisition and information gathering☆18Updated 2 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Zone transfers for rwhois☆20Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 4 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Escalation Servers and Scripts for Priv Escalation☆19Updated 5 years ago
- Simple utility to manage multiple ssh☆14Updated 2 years ago
- A multi-threaded class C network scanner. Loosely based on propecia.c by Bind.☆12Updated 10 years ago
- A tool for checking a hash:pass pot file for hashes from a user:hash file☆12Updated 8 years ago
- Squirtle the Browser-based NTLM Attack Toolkit☆18Updated 9 years ago
- Burp Intruder File Payload Generator☆18Updated 5 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Bug Bounty Clipboard☆17Updated 5 years ago
- ☆15Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- ☆20Updated 5 years ago
- random buffer overflows as I get ready to take the oscp in 2097☆12Updated 7 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆36Updated 5 years ago