shr3ddersec / WriteupsLinks
Random Tips and Writeups.
☆13Updated 6 years ago
Alternatives and similar repositories for Writeups
Users that are interested in Writeups are comparing it to the libraries listed below
Sorting:
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 4 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Magento Security Scanner☆15Updated 3 years ago
- Docker image for reconftw, a simple script intended to perform a full recon on an objective with multiple subdomains☆10Updated 4 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- parsers to make life easier☆13Updated 4 years ago
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- module for certexfil☆15Updated 2 years ago
- ☆18Updated 4 years ago
- Static analysis of APKs with regular expressions☆10Updated 4 years ago
- Proof of Concept in Go from Secureworks' research on Azure Active Directory Brute-Force Attacks. Inspired by @treebuilder's POC on PowerS…☆14Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- ShellC0de Generator☆11Updated 4 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- Web based favicon recon tool made using streamlit.☆9Updated 2 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- Automated Payload Test Controller☆10Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- A collection of Metasploit plugins I have written for various reasons.☆15Updated 4 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- Simple tools to handle string and generate subdomain permutations☆15Updated 3 years ago
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Burpsuite Plugin to bypass strict RePlay protection☆12Updated 4 years ago
- This is a lazy enumeration script made to make bug bounty enum & pentest flyovers easy as cake!☆14Updated 5 years ago
- Automated tool for setting up KingPhisher☆9Updated 4 years ago
- visually see issues with supported cipher suites☆16Updated last year
- ☆17Updated 6 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago