Automatic SQL injection and database takeover tool
-
Updated
Sep 18, 2020 - Python
{{ message }}
Automatic SQL injection and database takeover tool
Updates to this repository will continue to arrive until the number of links reaches 10000 links & 10000 pdf files .Learn Ethical Hacking and penetration testing .hundreds of ethical hacking & penetration testing & red team & cyber security & computer science resources.
Pupy is an opensource, cross-platform (Windows, Linux, OSX, Android) remote administration and post-exploitation tool mainly written in python
Web path scanner
A collection of open source and commercial tools that aid in red team operations.
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r
A swiss army knife for pentesting networks
Automated pentest framework for offensive security experts
OWASP Juice Shop: Probably the most modern and sophisticated insecure web application
Directory/File, DNS and VHost busting tool written in Go
An Information Security Reference That Doesn't Suck
This is a multi-use bash script for Linux systems to audit wireless networks.
巡风是一款适用于企业内网的漏洞快速应急,巡航扫描系统。
Collaborative Penetration Test and Vulnerability Management Platform
Next generation web scanner
Web Pentesting Fuzz 字典,一个就够了。
Penetration Testing Reference Bank - OSCP / PTP & PTX Cheatsheet
The Mobile App Pentest cheat sheet was created to provide concise collection of high value information on specific mobile application penetration testing topics.
The LAZY script will make your life easier, and of course faster.
Wiki to collect Red Team infrastructure hardening resources
Automated All-in-One OS command injection and exploitation tool.
Would be awesome if it would be possible to save the found streams to a M3U file, compatible with VLC. An example template of a valid M3U file is the following:
#EXTM3U
#EXTINF:-1 tvg-id="" tvg-name="" tvg-language="" tvg-logo="" tvg-country="" tvg-url="" group-title="",[IP AND CHANNELID HERE FOR NAME]
rtsp://192.168.0.5/route/to/stream/here
#EXTINF:-1 tvg-id="" tvg-name="" tvg-langua
We have a problem which has 2 possible solutions.
rustscan 127.0.0.1,google.comrustscan -a 127.0.0.1,google.comThe 2nd option would solve a significant amount of bugs, whereas the 1st option also solves the bugs but adds a lot more complexity to the program. See #211 for more info.
**Que
A high performance offensive security tool for reconnaissance and vulnerability scanning
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
The cheat sheet about Java Deserialization vulnerabilities
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ