usama-365 / paklistLinks
A wordlist for Infosec people in Pakistan
☆17Updated 4 years ago
Alternatives and similar repositories for paklist
Users that are interested in paklist are comparing it to the libraries listed below
Sorting:
- My Collection of exploits, reverse shells, scripts and more☆14Updated 2 years ago
- Burp Suite Certified Practitioner Exam Study☆18Updated 2 years ago
- ☆44Updated last year
- WooCommerce Payments: Unauthorized Admin Access Exploit☆40Updated 2 years ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated 5 months ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆37Updated 2 years ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆69Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆135Updated 3 years ago
- This Python script provides functionality to encode PowerShell commands while preserving the environment variables. It's especially usefu…☆16Updated last year
- Offensive Security OSWE Prep 2022☆74Updated 2 years ago
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated 10 months ago
- Red Teaming tools and techniques☆53Updated 2 years ago
- ☆24Updated 7 months ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- it is malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachment or web pag…☆123Updated 2 years ago
- This map lists the essential techniques to bypass anti-virus and EDR☆15Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆72Updated last month
- Bypassing File Upload Restriction using Magic Bytes☆18Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆87Updated last year
- Creating a Malicious Macro using MS Word☆23Updated 3 years ago
- ☆15Updated last year
- Searches for employees of a company on linkedin, generates a list of possible emails and verifies them.☆49Updated 9 months ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 2 years ago
- A couple of different scripts, made to automate attacks against NoSQL databases.☆65Updated last year
- Windows priviledge escalation script☆13Updated 5 months ago
- A C2 framework built for my bachelors thesis☆55Updated 8 months ago
- RedNeuron - Framework Creator of Malware focused in attacking Windows but created to execute framework in Linux 👾☆70Updated 2 years ago
- A collection of everything I learn while working as a pentester, doing certifications, bug bounty hunting or playing CTFs.☆17Updated 6 months ago
- A multi web security purposes tool☆39Updated 2 months ago
- PowerJoker is a Python program which generate a Dynamic PowerShell Reverse-Shell Generator; Unique Payloads with different results on Eac…☆53Updated 6 months ago