1.Create a Sample Vulnerable Application .
2.Start a netcat listner .
3.Run the exploit .
5.Use jdk1.8.0_20 for better results .
Exploit-db - https://www.exploit-db.com/exploits/50592
1.Create a Sample Vulnerable Application .
2.Start a netcat listner .
3.Run the exploit .
5.Use jdk1.8.0_20 for better results .
Exploit-db - https://www.exploit-db.com/exploits/50592
High level cheatsheet that was designed to make checks on the OSCP more manageable. This repository however could also be used for your own studying or for evaluating test systems like on HackTheBox
Caylent Security Catalyst Reference Architecture Examples This repository contains solutions for Caylent's Security Catalyst. The Security Catalyst is
MozDef: Documentation: https://mozdef.readthedocs.org/en/latest/ Give MozDef a Try in AWS: The following button will launch the Mozilla Enterprise Def
Bzip A brute force tool for password-protected zip file/folder(s). Note that this tool can only crack .zip files. Please DO not misuse. Installation g
sshuttle: where transparent proxy meets VPN meets ssh As far as I know, sshuttle is the only program that solves the following common case: Your clien
Unauthenticated Sqlinjection that leads to dump database but this one impersonated Admin and drops a interactive shell
Python Library For Ethical Hacker
An OSINT tool that searches for devices directly connected to the internet (IoT) with a user specified query. It returns results for Webcams, Traffic
Brute-Force-Connected Guess the password for Connected accounts the use : Create a new file and put usernames and passwords in it Example : joker:1234
๐ Public Bug Bounty Targets Data By BugBountyResources A collection of over 5.1M sub-domains and assets belonging to bug bounty targets, all put in a
dodgy Dodgy is a very basic tool to run against your codebase to search for "dodgy" looking values. It is a series of simple regular expressions desig
๐พ๐๐๐ ๐๐๐๐๐๐ ๐๐๐๐๐๐ - ๐ฝ๐ ๐ฒ๐๐๐ข๐๐๐๐๐ - ๐๐๐๐ ๐๐๐๐ - ๐๐๐๐๐๐ ๐ฟ๐ข๐๐๐๐ ๐ฟ๐๐๐๐๐๐ - ๐ฒ๐๐๐๐๐๐ ๐ฑ๐ข : ๐ฐ๐๐ ๐๐๐๐ - ๐ฒ๐๐๐ข๐ฟ๐๐๐ ๐ฒ๐๐ ๐ฝ๐๐ ๐ผ๐๐๐ ๐๐๐ ๐๐๐๐ ๐ฟ๐๐๐๐๐๐๐๐๐
Yobi Yara Based Detection for web browsers System Requirements Yobi requires python3 and and right now supports only firefox and other Gecko-based bro
Chapter 1 - Security Set and export your default region: export AWS_REGION=us-east-1 Set your AWS ACCOUNT ID:: AWS_ACCOUNT_ID=$(aws sts get-caller-ide
python-proxy-server This is a proxy server โค๏ธ application written in python โค๏ธ for trial purposes. The purpose of the application; Connecting to Hacke
reapoc OpenSource Poc && Vulnerable-Target Storage Box. We are aming to collect different normalized poc and the vulerable target to verify it. Now re
5GC_API_parse Description 5GC API parse is a BurpSuite extension allowing to assess 5G core network functions, by parsing the OpenAPI 3.0 not supporte
ๅฎๅก้ขๆฟWindowsๆๆๆนๆณ ๆฌ้กน็ฎๆด็ไธไบๅฎๅก็นๆง๏ผๅฏไปฅๅจๆ ๆผๆด็ๆ ๅตไธๅฉ็จ่ฟไบ็นๆงๆฅๅขๅ ๆๆ็ๆบไผใ
Log4jScanner Log4jScanner is a Log4j Related CVEs Scanner, Designed to Help Penetration Testers to Perform Black Box Testing on given subdomains. Disc
Crowbar - A windows post exploitation tool Status - โ๏ธ This project is now considered finished. Any updates from now on will most likely be new script