-
Updated
Jul 23, 2021 - Python
pentesting
Here are 1,739 public repositories matching this topic...
-
Updated
Apr 14, 2021
-
Updated
Jul 24, 2021 - JavaScript
Hello spoooopyyy hackers
This is a Hacktoberfest only issue!
This is also data-sciency!
The Problem
Our English dictionary contains words that aren't English, and does not contain common English words.
Examples of non-common words in the dictionary:
"hlithskjalf",
"hlorrithi",
"hlqn",
"hm",
"hny",
"ho",
"hoactzin",
"hoactzine
-
Updated
Jul 24, 2021 - Python
-
Updated
Apr 30, 2021 - Python
-
Updated
Jun 19, 2021
I testing bruteforce my opencart store.
this is body request:
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"
^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"
^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
-
Updated
Jul 5, 2021 - Python
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?
-
Updated
Jun 21, 2021 - Go
⭐ Challenge idea
Description
Several users originally missing security question answers - most notably bjoern.k
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Jun 28, 2021
-
Updated
Jul 20, 2021 - Shell
-
Updated
Jun 8, 2021 - Python
What would you like to happen?
The sections 4.7.11.1 Testing for Local File Inclusion & 4.7.11.2 Testing for Remote File Inclusion address two attack vectors that are very similar one to the other. Given this situation and the few documentation on the Remote injection one, my proposal would be to merge both in a single section called Testing for File Injection.
-
Updated
Jul 8, 2021
-
Updated
Jun 30, 2021 - Ruby
-
Updated
Jul 2, 2021 - Python
-
Updated
Mar 16, 2021 - Python
-
Updated
Jun 25, 2021 - Shell
-
Updated
Feb 28, 2021
-
Updated
Jul 23, 2021 - Python
-
Updated
Mar 1, 2021
-
Updated
Jul 22, 2021 - Python
Is there a way to skip the nmap scan and go straight to the attacking routes? In case i already know the target list is full of open rtsp port IPs.
Improve this page
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
App Attest allows your app to attach a hardware-backed assertion as a part of the request. Your server can use assertion to verify the request came from your genuine app, on a genuine Apple device.
https://developer.apple.com/videos/play/wwdc2021/10244/
https://developer.apple.com/documentation/devicecheck/assessing_fraud_risk
https://developer.apple.com/documentation/bundleresources/entit