☆87Mar 26, 2026Updated last month
Alternatives and similar repositories for iis-pentest
Users that are interested in iis-pentest are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- ☆18Apr 27, 2026Updated last week
- ☆24Apr 17, 2026Updated 3 weeks ago
- A program for collecting subdomains of a list of given second-level domains (SLD)☆15Feb 10, 2026Updated 2 months ago
- Chase subdomains by parsing the results of Google and Yandex search results☆15Sep 29, 2023Updated 2 years ago
- It provides configurable shortcuts to help make the pre-qual/testing process more efficient.☆11Nov 19, 2022Updated 3 years ago
- Wordpress hosting with auto-scaling - Free Trial Offer • AdFully Managed hosting for WordPress and WooCommerce businesses that need reliable, auto-scalable performance. Cloudways SafeUpdates now available.
- Unicode Security Toolkit☆40Oct 7, 2024Updated last year
- ☆16Mar 29, 2024Updated 2 years ago
- Recently, the OpenSSH maintainers released security updates to fix a critical vulnerability that could lead to unauthenticated remote cod…☆13Jul 2, 2024Updated last year
- Reflected XSS Payload List for Vue.js (2 & 3)☆15Jan 12, 2023Updated 3 years ago
- Vulnerable LLM Application☆14Jan 1, 2024Updated 2 years ago
- Red Team list and cheat sheets☆11Jul 7, 2024Updated last year
- ☆22Jun 21, 2022Updated 3 years ago
- ☆423Mar 26, 2026Updated last month
- A penetration testing tool for firestore databases☆13Nov 5, 2020Updated 5 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- CVE, reports, research☆15Mar 17, 2021Updated 5 years ago
- multiduplicut : optimize wordlists-based password cracking methods chaining☆16Feb 25, 2022Updated 4 years ago
- Scripts to interact with Microsoft Graph APIs☆45Nov 7, 2024Updated last year
- Retrieve host information from NTLM☆32Feb 4, 2021Updated 5 years ago
- A simple to use single-include Windows API resolver☆22Jul 9, 2024Updated last year
- I created this to dump challenge for CTF that I participated☆12May 26, 2023Updated 2 years ago
- A tool to generate wordlists based on case☆30Nov 24, 2025Updated 5 months ago
- autoreport generates bug report templates for security researchers☆20Aug 4, 2023Updated 2 years ago
- Random Tips and Writeups.☆15Feb 21, 2019Updated 7 years ago
- GPUs on demand by Runpod - Special Offer Available • AdRun AI, ML, and HPC workloads on powerful cloud GPUs—without limits or wasted spend. Deploy GPUs in under a minute and pay by the second.
- Unauthorized Access to Metadata and User Data like CTF☆28Nov 30, 2024Updated last year
- ☆21Updated this week
- Oneliner Bug Bounty Collection collected from GitHub to all bug bounty hunters☆38Dec 12, 2023Updated 2 years ago
- Nuclei-AI-Prompts☆360Jun 22, 2025Updated 10 months ago
- How to do recon on a web-application properly☆15Jul 12, 2022Updated 3 years ago
- Spaghetti - Web Application Security Scanner☆22Aug 11, 2017Updated 8 years ago
- A simple python script to exploit vulnerable Firebase Database. If the owner of the app have set the security rules as true for both "rea…☆22Apr 22, 2024Updated 2 years ago
- Cobalt Strike Beacon Object File (BOF) that uses CredUIPromptForWindowsCredentials API to invoke credential prompt☆24Nov 23, 2022Updated 3 years ago
- Exploiting Android devices☆10Sep 12, 2022Updated 3 years ago
- Deploy on Railway without the complexity - Free Credits Offer • AdConnect your repo and Railway handles the rest with instant previews. Quickly provision container image services, databases, and storage volumes.
- Terminate AV/EDR processes by exploiting the vulnerable NsecSoft driver☆32Sep 15, 2025Updated 7 months ago
- A Chrome extension that automatically scans web pages and internal links for user-defined keywords, storing results and sending notificat…☆25Sep 28, 2025Updated 7 months ago
- FAST WEB APPLICATION VULNERABILITY SCANNER written in python3☆26Aug 4, 2023Updated 2 years ago
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆27Oct 1, 2023Updated 2 years ago
- Quickly generate every payload type for each listener and optionally host via HTTP.☆22Aug 23, 2021Updated 4 years ago
- Docker container for running CobaltStrike 4.7 and above☆25Mar 20, 2025Updated last year
- This repository presents a proof-of-concept of CVE-2023-22527☆14Jan 23, 2024Updated 2 years ago