tikeswar / kidoLinks
White hat hacking passwords using ML
☆53Updated 4 years ago
Alternatives and similar repositories for kido
Users that are interested in kido are comparing it to the libraries listed below
Sorting:
- SAIVS (Spider Artificial Intelligence Vulnerability Scanner).☆54Updated 5 years ago
- Exploit code for CVE-2020-11579, an arbitrary file disclosure through the MySQL client in PHPKB☆25Updated 2 years ago
- A Python3 module to assist in fuzzing web applications☆57Updated 2 years ago
- CVE-2020-12828 PoC and Analysis.☆28Updated 5 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 6 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 7 years ago
- (Wordpress) Ninja Forms File Uploads Extension <= 3.0.22 – Unauthenticated Arbitrary File Upload☆17Updated 6 years ago
- UNMAINTAINED - Vulnerability scanner and information gatherer for the Concrete5 CMS☆20Updated 5 years ago
- PoCs for CVE-2020-11108; an RCE and priv esc in Pi-hole☆27Updated 5 years ago
- The system is broken face recognition for adversarial example testing.☆20Updated 4 years ago
- Standalone POCs/Exploits from various sources for Jok3r☆29Updated 4 years ago
- Scan for open S3 buckets and dump☆38Updated 7 years ago
- XPT - XSS Polyglot Tester☆36Updated 6 years ago
- This is a concept poc of command and control server implemented over blockchain☆56Updated 6 years ago
- Some of my public exploits☆52Updated 5 years ago
- ☆49Updated 5 years ago
- Python implementation of RSA reverse shell.☆11Updated 9 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- eternalrelayx☆36Updated 6 years ago
- Interactive Post Exploitation Tool☆37Updated 6 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆40Updated 7 years ago
- Incident Response Collections☆11Updated 7 years ago
- OptionsBleed (CVE-2017-9798) PoC / Scanner☆18Updated last year
- CVE-2019-9580 - StackStorm: exploiting CORS misconfiguration (null origin) to gain RCE☆31Updated 6 years ago
- Jira Information Gatherer☆29Updated 8 years ago
- Simple burp extension for routing traffic over tor. It instruments tor to switch to a new circuit after every N requests.☆20Updated 3 years ago
- Self defense post module for metasploit☆17Updated 6 years ago
- ☆34Updated 7 years ago
- Tool to test for existence of CVE-2020-8218☆22Updated 5 years ago