Archive - Repository contains old publicly released presentations, tools, Proof of Concepts and other junk.
☆26Mar 9, 2025Updated 11 months ago
Alternatives and similar repositories for Public
Users that are interested in Public are comparing it to the libraries listed below
Sorting:
- Script for monitoring changes in javascript files on WebApps for offensive reconnaissance.☆28Aug 4, 2021Updated 4 years ago
- ☆10Oct 30, 2019Updated 6 years ago
- A Burp Suite extension for identifying missing Subresource Integrity attributes.☆13Jun 12, 2019Updated 6 years ago
- Automated compromise detection of the world's most popular packages☆17Sep 25, 2023Updated 2 years ago
- ☆14Nov 29, 2019Updated 6 years ago
- Some Templates for Bash Scripting☆17Sep 30, 2022Updated 3 years ago
- A tool for fetching archived URLs (to be rewritten in Go).☆41Jul 19, 2018Updated 7 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆37Nov 8, 2017Updated 8 years ago
- This application is developed to test the race condition vulnerability in the web application. We have discussed about this vulnerability…☆14Oct 1, 2016Updated 9 years ago
- HTTP requests of FrontPage expolit☆25Dec 19, 2013Updated 12 years ago
- Lab that will help you to understand how type juggling vulnerability works.☆22Sep 23, 2020Updated 5 years ago
- Fernbach is a vulnerable API written in the Flask micro web framework. The intent of this API is for testing the OWASP top ten vulnerabil…☆30Feb 4, 2022Updated 4 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆32Jan 22, 2018Updated 8 years ago
- CIS & Azure Security Center Hardening recommendations implemented in PowerShell DSC from Azure Automation☆34Jun 10, 2021Updated 4 years ago
- Proof-of-concept CORS exploitation tool.☆35Sep 7, 2019Updated 6 years ago
- Auto Recon Bash Script☆31Dec 31, 2024Updated last year
- Analyzers for Portable Executable anomalies and other malware behavior.☆33Updated this week
- ☆10Jun 16, 2021Updated 4 years ago
- ☆10Oct 9, 2024Updated last year
- Script will enumerate domain name using horizontal enumeration, reverse lookup. Each horziontal domain will then be vertically enumerated…☆31Aug 2, 2019Updated 6 years ago
- wfuzz, SecLists and john -based dirbusting / forceful browsing script intended to be used during web pentest assingments☆41Jul 1, 2019Updated 6 years ago
- Archaeologit scans the history of a user's GitHub repositories for a given pattern to find sensitive things.☆143Jul 2, 2018Updated 7 years ago
- Tradecraft Development Fundamentals☆40Aug 6, 2021Updated 4 years ago
- A collection of scripts to extend Burp Suite☆142Apr 8, 2019Updated 6 years ago
- OSINT scanning tool which discovers and maps directories found in javascript files hosted on a website.☆228Feb 24, 2019Updated 7 years ago
- ThingFinder is a tool designed to facilitate searching and analysing code, whether it's source code or compiled binary executables. It pr…☆40Jun 16, 2024Updated last year
- Some Powershell scripts developed during my security consulting work. Hopefully they are useful to you too!☆13Apr 19, 2020Updated 5 years ago
- CVE-2024-43451 is a Windows NTLM vulnerability that allows an attacker to force authentication and capture NTLM hashes by using malicious…☆15Jan 21, 2025Updated last year
- Python script to give you subsets of the nmap "top-ports". For example, I want the 10th to 100th most common TCP ports. Spits out a comma…☆18Mar 8, 2020Updated 5 years ago
- 记录整理日常java安全分析代码☆14Dec 25, 2018Updated 7 years ago
- Automate Recon process using Shell Scripting☆11Nov 26, 2021Updated 4 years ago
- Import Recommended Firewall Rules from vRNI to VMware Cloud on AWS or NSX-T☆10Feb 3, 2022Updated 4 years ago
- Extensor is a command-line tool designed to help users quickly gather URLs containing specific file extensions from a given source (e.g.,…☆10Mar 13, 2024Updated last year
- .NET profiler DLL loading can be abused to make a legit .NET application load a malicious DLL using environment variables. This exploit i…☆46Jul 29, 2024Updated last year
- A repo which contains lots of things which it shouldn't☆43Oct 23, 2019Updated 6 years ago
- ☆38Aug 12, 2020Updated 5 years ago
- ☆42Apr 18, 2023Updated 2 years ago
- Tool for making it easy to collect dns results from the CLI☆40Aug 14, 2024Updated last year
- Tool is to check for Cache Deception Attack Both For Authenticated and UnAuthenticated Pages☆44Nov 23, 2021Updated 4 years ago