-
Updated
Aug 8, 2021
penetration-testing
Here are 1,118 public repositories matching this topic...
-
Updated
Nov 6, 2021 - Python
-
Updated
Sep 29, 2021
-
Updated
Nov 6, 2021 - Jupyter Notebook
-
Updated
Feb 17, 2021
-
Updated
Nov 5, 2021 - Python
-
Updated
Nov 5, 2021
-
Updated
Jul 24, 2021 - PowerShell
-
Updated
Sep 29, 2021
-
Updated
Nov 5, 2021 - Python
-
Updated
Jul 24, 2021 - PowerShell
-
Updated
Oct 5, 2021 - Shell
-
Updated
Nov 3, 2021
What would you like added?
Common Platform Enumeration (CPE) is a structured naming scheme for information technology systems, software, and packages. Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name.
The usage of CPE naming is
-
Updated
Sep 15, 2021
-
Updated
Nov 7, 2021 - PowerShell
-
Updated
Sep 14, 2021
-
Updated
Jul 8, 2021
-
Updated
Oct 22, 2021 - Ruby
Hey, here we need add url decoding cuz that invalid link with symbols of get request like ?, &, = etc
p.s thx for awesome tool
-
Updated
Jun 10, 2021 - Python
-
Updated
Feb 26, 2021
-
Updated
Nov 5, 2021 - Python
-
Updated
Jul 10, 2019
-
Updated
Aug 28, 2021 - Shell
-
Updated
Jan 28, 2020 - Ruby
-
Updated
Nov 6, 2021 - Python
gives my list of factory logins and passwords that I could find on the Internet, including wifi spy cameras supporting RTSP using android lookcampro and hdsmartIPC applications
{
"usernames": [
"",
"666666",
"888888",
"Admin",
"admin",
"admin1",
"administrator",
"Administrator",
"aiphone",
"Dinion",
"guest",
"root",
"service",
"supervisor",
"ubnt",
"user"
],
"passwords":
-
Updated
Aug 7, 2020
Improve this page
Add a description, image, and links to the penetration-testing topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the penetration-testing topic, visit your repo's landing page and select "manage topics."
I testing bruteforce my opencart store.
this is body request: