-
Updated
Dec 13, 2021 - Python
pentesting
Here are 1,995 public repositories matching this topic...
-
Updated
Apr 14, 2021
-
Updated
Dec 12, 2021 - JavaScript
-
Updated
Dec 19, 2021 - Shell
-
Updated
Dec 13, 2021 - Python
-
Updated
Dec 20, 2021 - Python
-
Updated
Oct 31, 2021 - Python
The only working feedback when submitting the Change Password form is the success notification in this.confirmation
. No error message is ever displayed on screen. The corresponding code blocks are reached for the expected error conditions, but the this.error
field is never shown on screen.
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?
I testing bruteforce my opencart store.
this is body request:
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"
^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"
^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
-
Updated
Sep 28, 2021
-
Updated
Dec 17, 2021 - Python
-
Updated
Oct 21, 2021 - Go
RustScan has an accessible mode, rustscan --accessible
which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible
a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!]
[~]
[>]
| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Nov 26, 2021 - Shell
-
Updated
Nov 22, 2021 - CSS
-
Updated
Dec 11, 2021 - Python
What would you like added?
Common Platform Enumeration (CPE) is a structured naming scheme for information technology systems, software, and packages. Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name.
The usage of CPE naming is
-
Updated
Oct 26, 2021 - Shell
-
Updated
Dec 20, 2021 - Python
-
Updated
Jul 8, 2021
-
Updated
Dec 16, 2021 - Ruby
Hey, here we need add url decoding cuz that invalid link with symbols of get request like ?, &, = etc
p.s thx for awesome tool
-
Updated
Nov 11, 2021 - Python
-
Updated
Mar 16, 2021 - Python
-
Updated
Aug 28, 2021 - Shell
-
Updated
Sep 1, 2021
-
Updated
Dec 20, 2021 - Python
Improve this page
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."
Hey Hackers of this spoopy month!👻
Welcome to the Ciphey repo(s)!
This issue requires you to add a decoder.
This wiki section walks you through EVERYTHING you need to know, and we've added some more links at the bottom of this issue to detail more about the decoder.
https://github.com/Ciphey/Ciphey/wiki#adding-your-own-crackers--decoders
https://www.dcode.fr/t9-cipher
https://en.wikipe