☆85Jun 17, 2025Updated 9 months ago
Alternatives and similar repositories for iis-pentest
Users that are interested in iis-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆16Jan 23, 2026Updated 2 months ago
- ☆21Feb 10, 2026Updated last month
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated last month
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- End-to-end encrypted email - Proton Mail • AdSpecial offer: 40% Off Yearly / 80% Off First Month. All Proton services are open source and independently audited for security.
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- ☆16Mar 29, 2024Updated 2 years ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆12Jul 2, 2024Updated last year
- Reflected XSS Payload List for Vue.js (2 & 3)☆15Jan 12, 2023Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- ☆22Jun 21, 2022Updated 3 years ago
- ☆421Jan 13, 2026Updated 2 months ago
- Managed Database hosting by DigitalOcean • AdPostgreSQL, MySQL, MongoDB, Kafka, Valkey, and OpenSearch available. Automatically scale up storage and focus on building your apps.
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- A simple to use single-include Windows API resolver☆23Jul 9, 2024Updated last year
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 4 months ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- Proton VPN Special Offer - Get 70% off • AdSpecial partner offer. Trusted by over 100 million users worldwide. Tested, Approved and Recommended by Experts.
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆19Updated this week
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 6 months ago
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- Nuclei-AI-Prompts☆356Jun 22, 2025Updated 9 months ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- Spaghetti - Web Application Security Scanner☆21Aug 11, 2017Updated 8 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated last year
- Wordpress hosting with auto-scaling on Cloudways • AdFully Managed hosting built for WordPress-powered businesses that need reliable, auto-scalable hosting. Cloudways SafeUpdates now available.
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆33Sep 15, 2025Updated 6 months ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆26Aug 4, 2023Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year