wlayzz / RopstenCtfLinks
RopstenCtf is an easy tool to interact with the ethereum ropsten network for ctf purpose and more.
☆15Updated 2 years ago
Alternatives and similar repositories for RopstenCtf
Users that are interested in RopstenCtf are comparing it to the libraries listed below
Sorting:
- Pwndoc local file inclusion to remote code execution of Node.js code on the server☆46Updated 4 months ago
- A script to automatically dump all URLs present in /server-status to a file locally.☆24Updated 4 months ago
- User enumeration and password spraying tool for testing Azure AD☆70Updated 3 years ago
- A list of weird comparison in SQL☆15Updated 3 years ago
- This repository presents a proof-of-concept of CVE-2023-22527☆12Updated last year
- A python script to automatically add a KeyCredentialLink to newly created users, by quickly connecting to them with default credentials.☆22Updated last year
- A script to enumerate valid usernames based on the requests response times.☆20Updated 3 years ago
- ☆13Updated last year
- Tooling for the OffSec Experienced Pentester (OSEP) and OffSec Exploit Developer (OSED) course☆16Updated last year
- A tool to extract and dump files of mercurial SCM exposed on a web server.☆11Updated 4 months ago
- Exploit for Symfony CVE-2024-50340 (forked eos)☆29Updated 7 months ago
- A python script to force authentication using MS-RPRN RemoteFindFirstPrinterChangeNotificationEx function (opnum 65).☆25Updated 4 months ago
- A python library to interact with Pwndoc instances for pentest reports generation☆18Updated last month
- Hacker Animation Cool Console Kryptographic Sequencer (haccks)☆13Updated 8 months ago
- MailMasta wordpress plugin Local File Inclusion vulnerability (CVE-2016-10956)☆17Updated 3 years ago
- Python script to check if there is any differences in responses of an application when the request comes from a search engine's crawler.☆23Updated last year
- Vulnerable Windows Application☆16Updated last year
- Automatically extracts NT and LM hashes from Windows memory dumps based on volatility.☆24Updated last year
- Command line tool to fetch, decode and brute-force CodeIgniter session cookies by guessing and bruteforcing secret keys.☆14Updated 4 months ago
- Use the GCP testIamPermissions functionality to bruteforce and discover your permissions☆35Updated 2 months ago
- Recon scripts for Red Team and Web blackbox auditing☆24Updated 2 months ago
- Used to get NTLMv2 Hashes from SMB☆14Updated 8 months ago
- Custom Amsi Bypass by patching AmsiOpenSession function in amsi.dll☆33Updated last week
- ☆27Updated 2 years ago
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆41Updated last week
- Check robustness of your (their) Active Directory accounts passwords☆35Updated 3 months ago
- Make better use of the embedded browser that comes by default with Burp☆43Updated last year
- A Proof-Of-Concept for the CVE-2023-43770 vulnerability.☆33Updated last year
- A script to factorize integers with sagemath and factordb.☆12Updated 4 months ago
- A repository with my code snippets for research/education purposes.☆50Updated last year