-
Updated
Nov 24, 2020 - Python
pentesting
Here are 1,431 public repositories matching this topic...
-
Updated
Nov 25, 2020
-
Updated
Oct 27, 2020 - Python
Hello spoooopyyy hackers
This is a Hacktoberfest only issue!
This is also data-sciency!
The Problem
Our English dictionary contains words that aren't English, and does not contain common English words.
Examples of non-common words in the dictionary:
"hlithskjalf",
"hlorrithi",
"hlqn",
"hm",
"hny",
"ho",
"hoactzin",
"hoactzine
-
Updated
Nov 25, 2020 - Python
-
Updated
Sep 1, 2020
Hi All,
So I'm trying to use hydra to bruteforce a login on a system that uses custom http headers to receive the username and password. Hydra does not seem to be doing substitution of ^USER^ and ^PASS^ when used as HTTP headers. If I issue issuing a call to hydra like this:
hydra "http-post://0.0.0.0:8000/:H=username\:^USER^:H=password\:^PASS^" -l admin -p admin
I see the following r
-
Updated
Nov 7, 2020 - Python
-
Updated
Nov 26, 2020 - Shell
⭐ Challenge idea
Description
I notice that the Cards API returns the full credit card number, while the UI only shows the last digits
Underlying vulnerabilities
- entire card storage -> PCI/DSS
- returning more info than what's displayed
Expected difficulty
|
|:------------------------
-
Updated
Nov 17, 2020 - Go
-
Updated
Nov 8, 2020
-
Updated
Nov 17, 2020 - Shell
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Jan 29, 2020 - Python
-
Updated
Sep 6, 2020
-
Updated
Sep 10, 2020 - JavaScript
-
Updated
Nov 13, 2020 - Python
-
Updated
Nov 25, 2020 - Ruby
-
Updated
Nov 25, 2020 - Shell
-
Updated
Aug 30, 2020
-
Updated
Mar 24, 2020
-
Updated
Nov 23, 2020 - Python
Context
Please select one:
- I use the docker image
ullaakut/cameradar
- I use my own build of the docker image
- I use the pre-compiled binary
- I use my own build of the binary
- None of the above / I don't know
Please select one:
- I use a specific version:
- I use the latest commit of the master branch
- I use the latest comm
-
Updated
Mar 5, 2020 - Python
so if the password is correct it accepts it .... and if it's wrong it says the entered password is wrong .. and asks for the password again .. just like what the real sites do :)
Improve this page
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ