usama-365 / paklistLinks
A wordlist for Infosec people in Pakistan
☆18Updated 5 years ago
Alternatives and similar repositories for paklist
Users that are interested in paklist are comparing it to the libraries listed below
Sorting:
- This simple but powerful script will introduce a new type of malware that will turn off the firewall, start an HTTP server, forward its p…☆59Updated last year
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 3 years ago
- Collection of my talks and workshops about hacking & cybersecurity☆28Updated 11 months ago
- Bypassing File Upload Restriction using Magic Bytes☆22Updated 3 years ago
- This vulnerability allows an attacker to bypass the credentials brute-force prevention mechanism of the Embedded Web Server (interface) o…☆90Updated last year
- HTML smuggling is a malicious technique used by hackers to hide malware payloads in an encoded script in a specially crafted HTML attachm…☆143Updated 3 years ago
- An offensive security tool used to enumerate and spray passwords for O365 accounts on both Managed and Federated AD services.☆48Updated 3 years ago
- .NET Antivirus Evasion Tool (Exe2Bat)☆39Updated 3 years ago
- ☆45Updated 2 years ago
- A project aimed at automating and making repetitive tasks easy while pentesting , like creating msf payloads or a one-liner reverse shel…☆11Updated 3 years ago
- Remote Access Trojan I wrote, but didn't finish. Although, you could use this as is without many issues.☆39Updated last year
- A multi web security purposes tool☆45Updated 8 months ago
- Audit and pentest methodologies for Windows including internal enumeration, privesc, lateral movement, etc.☆17Updated 5 months ago
- Hydra wrapper for bruteforcing Microsoft Outlook Web Application.☆70Updated 2 years ago
- A powerful and delightful PHP WebShell☆67Updated 11 months ago
- Red Teaming tools and techniques☆56Updated 2 years ago
- TheSprayer is a cross-platform tool designed to help penetration testers spray passwords against an Active Directory domain without locki…☆37Updated 2 months ago
- ☆106Updated last year
- A C2 framework built for my bachelors thesis☆57Updated 3 weeks ago
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆47Updated last year
- Intentionally vulnerable Linux application for buffer overflow and RCE development practice☆29Updated 4 years ago
- Burp Suite Certified Practitioner Exam Study☆18Updated 3 years ago
- A solution to create obfuscated shellcode from msfvenom for PowerShell.☆26Updated 3 years ago
- A simple python script to dump remote files through a local file read or local file inclusion web vulnerability.☆77Updated last year
- The purpose of this tool is: 1. to transliterate and generate possible usernames out of a full names list that may include names written …☆138Updated last year
- Cross platform (Linux / Windows) shellcode packer for CTFs and pentest / red team exams aiming for AV evasion !☆108Updated last week
- Docker network containing many vulnerable targets for practicing Red Teaming concepts (initial access, priv esc, persistence, lateral, C2…☆86Updated 2 years ago
- Basic network sec tool for real-time threat detection and C2 communication prevention. Features 70+ detection modules, IOC integration, c…☆16Updated last year
- Hide an IP address in scripts using hex/decimal/octal conversions☆72Updated 10 months ago
- A utility for quickly and easily locating, web hosting and transferring resources (e.g., exploits/enumeration scripts) from your filesyst…☆180Updated last year