Automatic SQL injection and database takeover tool
-
Updated
Aug 24, 2020 - Python
{{ message }}
Automatic SQL injection and database takeover tool
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Web path scanner
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r
A collection of open source and commercial tools that aid in red team operations.
A swiss army knife for pentesting networks
Automated pentest framework for offensive security experts
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Directory/File, DNS and VHost busting tool written in Go
An Information Security Reference That Doesn't Suck
Using the -p x flag to add a delay between requests also means that hitting ctrl+c takes x seconds to exit,
This is a multi-use bash script for Linux systems to audit wireless networks.
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Collaborative Penetration Test and Vulnerability Management Platform
Next generation web scanner
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
Web Pentesting Fuzz 字典,一个就够了。
Describe the bug
When running Ciphey on a base64-encoded file using the - command-line parameter, Ciphey picks up and decodes the base64-encoded file's contents, and prints the decoded content like normal. When running Ciphey on a base64-encoded file using the -i command-line parameter, Ciphey finds no results.
To Reproduce
Steps to reproduce the behavior:
Wiki to collect Red Team infrastructure hardening resources
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
Automated All-in-One OS command injection and exploitation tool.
The LAZY script will make your life easier, and of course faster.
Would be awesome if it would be possible to save the found streams to a M3U file, compatible with VLC. An example template of a valid M3U file is the following:
#EXTM3U
#EXTINF:-1 tvg-id="" tvg-name="" tvg-language="" tvg-logo="" tvg-country="" tvg-url="" group-title="",[IP AND CHANNELID HERE FOR NAME]
rtsp://192.168.0.5/route/to/stream/here
#EXTINF:-1 tvg-id="" tvg-name="" tvg-langua
Describe the bug
We have doc comments in the code, but we're not appearing on https://docs.rs
I believe we should automatically be added when we publish to Cargo, in this case we are not.
To Reproduce
https://docs.rs/releases/search?query=rustscan
Expected behavior
We appear on the docs site.
A high performance offensive security tool for reconnaissance and vulnerability scanning
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
The cheat sheet about Java Deserialization vulnerabilities
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
Describe the issue
Needle doesn't seem to be maintained anymore. The last update was > 1 year and no issues have been answered this year. It also doesnt' seem to work on iOS JB devices with Chimera. FSecureLABS/needle#273
We should review where we use Needle and if other tools are a better alternative (e.g. objection, passionfruit).