reewardius / iis-pentestView external linksLinks
☆82Jun 17, 2025Updated 7 months ago
Alternatives and similar repositories for iis-pentest
Users that are interested in iis-pentest are comparing it to the libraries listed below
Sorting:
- ☆14Jan 23, 2026Updated 3 weeks ago
- ☆18Updated this week
- Another pentest of a vulnerable windows server☆15Sep 17, 2021Updated 4 years ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Updated this week
- ☆22Jun 21, 2022Updated 3 years ago
- Reflected XSS Payload List for Vue.js (2 & 3)☆15Jan 12, 2023Updated 3 years ago
- Scripts to interact with Microsoft Graph APIs☆44Nov 7, 2024Updated last year
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- This repository contains random Nuclei templates I've created. Most of them based on recent security issues and exploits.☆18May 21, 2024Updated last year
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆36Dec 12, 2023Updated 2 years ago
- ☆417Jan 13, 2026Updated last month
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆26Oct 1, 2023Updated 2 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆23Nov 23, 2022Updated 3 years ago
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆13Jan 31, 2025Updated last year
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 3 years ago
- LibreHealth v2.0.0 suffers from an authenticated file upload vulnerability allowing remote attackers to gain remote code execution (RCE) …☆13Jul 19, 2020Updated 5 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- The Proxy Auto Configuration (PAC) file dynamic generator which allows you to specify the proxying rules and the PAC-file will be generat…☆10Dec 5, 2019Updated 6 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 6 years ago
- SAPLAR - LFI & Path Traversal Scanner☆15Mar 11, 2025Updated 11 months ago
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆160Aug 28, 2025Updated 5 months ago
- A tool for identifying and exploiting vulnerable Viewstate implementations in ASP.NET☆59Dec 8, 2025Updated 2 months ago
- Repository of useful payloads and tips for pentesting/bug bounty.☆29Nov 15, 2024Updated last year
- Tool for obtaining information about PPL processes☆16Feb 12, 2024Updated 2 years ago
- ☆12Apr 21, 2020Updated 5 years ago
- A basic Terraform configuration for provisioning simple red team infrastructure in DigitalOcean☆12May 5, 2021Updated 4 years ago
- A cybersecurity challenge, based on a real world finding☆12Jul 11, 2024Updated last year
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Jan 23, 2024Updated 2 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Jan 12, 2026Updated last month
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆24Sep 28, 2025Updated 4 months ago
- Collection of antivirus bypass techniques☆12Nov 20, 2023Updated 2 years ago
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Mar 6, 2023Updated 2 years ago
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- An x64 binary executing code that's not inside of it.☆17Feb 28, 2023Updated 2 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- Custom Trickest Workflows☆12Oct 26, 2023Updated 2 years ago