-
Updated
May 30, 2021 - Python
pentesting
Here are 1,679 public repositories matching this topic...
-
Updated
Apr 14, 2021
-
Updated
Jun 1, 2021 - JavaScript
Hello spoooopyyy hackers
This is a Hacktoberfest only issue!
This is also data-sciency!
The Problem
Our English dictionary contains words that aren't English, and does not contain common English words.
Examples of non-common words in the dictionary:
"hlithskjalf",
"hlorrithi",
"hlqn",
"hm",
"hny",
"ho",
"hoactzin",
"hoactzine
-
Updated
Apr 30, 2021 - Python
-
Updated
Jun 3, 2021 - Python
-
Updated
Apr 8, 2021
I testing bruteforce my opencart store.
this is body request:
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"
^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"
^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
-
Updated
Jun 1, 2021 - Python
-
Updated
May 27, 2021 - Go
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?
-
Updated
Jun 3, 2021 - TypeScript
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Apr 30, 2021
-
Updated
Jun 3, 2021 - Shell
-
Updated
Mar 28, 2021 - Python
-
Updated
Jun 1, 2021
-
Updated
Mar 11, 2021 - Ruby
-
Updated
Mar 16, 2021 - Python
-
Updated
May 18, 2021 - Python
-
Updated
Apr 17, 2021 - Shell
-
Updated
Mar 1, 2021
-
Updated
Feb 28, 2021
-
Updated
May 28, 2021 - Python
Is there a way to skip the nmap scan and go straight to the attacking routes? In case i already know the target list is full of open rtsp port IPs.
What's the issue?
Overwritten test scenario, can be summarized and link to payload lists from other repos
How do we solve it?
Chop down the content to the required and needed information, link to payload lists instead of enumerating all possible usernames and passwords, provide further guidance on how to test.
If no one is up to handle it, I can take care of it
-
Updated
Jun 3, 2021 - Python
Improve this page
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
Add 8.7 and 8.8 for android and ios: show how you can delay the attacker or report tampering to the backend as a response to a tamper detected
8.7: The app implements multiple mechanisms in each defense category (8.1 to 8.6). Note that resiliency scales with the amount, diversity of the originality of the mechanisms used.
8.8: The detection mechanisms trigger responses of different types, includ