riyazwalikar / injection-attacks-nosql-talkView external linksLinks
Slides of the talk on Injection attacks in apps with NoSQL Backends, given at null OWASP Bangalore monthly meet on 27th April 2019
☆23Apr 28, 2019Updated 6 years ago
Alternatives and similar repositories for injection-attacks-nosql-talk
Users that are interested in injection-attacks-nosql-talk are comparing it to the libraries listed below
Sorting:
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17May 17, 2019Updated 6 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Jun 20, 2022Updated 3 years ago
- References, tools and sample payloads☆11Sep 16, 2016Updated 9 years ago
- ☆12Sep 25, 2020Updated 5 years ago
- Library Secruity dependency Checker☆12Sep 13, 2019Updated 6 years ago
- A list of useful payloads and bypass for Web Application Security and Pentest/CTF☆11May 25, 2019Updated 6 years ago
- A tool that can help detect and takeover subdomains with dead DNS records☆12Aug 23, 2018Updated 7 years ago
- A better dns bruteforcer written in golang☆13Nov 4, 2018Updated 7 years ago
- super-Django-CC is a simle web interface for commoncrawl.org☆15Dec 8, 2022Updated 3 years ago
- All the content from my Troopers 19 talk☆12Mar 20, 2019Updated 6 years ago
- ☆13Oct 19, 2022Updated 3 years ago
- A PowerShell script to prevent Sysmon from writing its events☆16Apr 23, 2020Updated 5 years ago
- Steal users password with a fake sudo function.☆43Feb 29, 2024Updated last year
- Modifies machine.config for persistence after installing signed .net assembly onto GAC☆13Mar 17, 2022Updated 3 years ago
- 可能有一些你没见过的端口扫描脚本☆12Nov 28, 2018Updated 7 years ago
- This Burp Suite extension enables the generation of shareable links to specific requests which other Burp Suite users can import.☆12May 20, 2022Updated 3 years ago
- Merge results from NMAP and Masscan into one CSV file☆18Jun 19, 2018Updated 7 years ago
- ☆16Nov 10, 2018Updated 7 years ago
- ☆92Dec 8, 2022Updated 3 years ago
- ☆18Jul 3, 2020Updated 5 years ago
- Some talks about security☆13Nov 20, 2020Updated 5 years ago
- AppXSvc Arbitrary File Security Descriptor Overwrite EoP☆20Sep 15, 2019Updated 6 years ago
- A simple framework for distributed task workflow using redis.☆32Jan 13, 2014Updated 12 years ago
- ☆34Jul 17, 2019Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Dec 11, 2018Updated 7 years ago
- dankAlerts is powered by Sysmon and Memes. Would you notice if a suspicious process was recorded in the event log?☆18Jun 24, 2020Updated 5 years ago
- A simple way to exfiltrate data using spotify API☆20Updated this week
- Small POC in powershell exploiting hardlinks during the VM deletion process☆53Jan 18, 2020Updated 6 years ago
- BloodHound Data Scanner☆45Jul 7, 2020Updated 5 years ago
- ☆12Oct 16, 2017Updated 8 years ago
- Alphanumeric+1 shellcoding tools for RISC-V☆37Aug 12, 2019Updated 6 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Apr 25, 2018Updated 7 years ago
- ☆16Feb 26, 2018Updated 7 years ago
- Ruby based script to perform application scanning of a URL, looking for specific pages to target.☆25Oct 29, 2014Updated 11 years ago
- Tool to decompress data from Windows 10 page files and memory dumps, that has been compressed by the Windows 10 memory manager.☆51Apr 9, 2019Updated 6 years ago
- Python3 Ebowla... 3Bowla☆17Jan 7, 2020Updated 6 years ago
- Exploits for some of the vulnerabilities I have discovered☆19Aug 3, 2020Updated 5 years ago
- CVE-2018-3191 反弹shell☆16Oct 23, 2018Updated 7 years ago
- Generate pentest reports based on github issues.☆16Dec 8, 2022Updated 3 years ago