Skip to content
#

pentest

Here are 716 public repositories matching this topic...

bugrabklmz
bugrabklmz commented Jan 23, 2021

I testing bruteforce my opencart store.

this is body request:

-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"

^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"

^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat

大型内网渗透扫描器&Cobalt Strike,Ladon7.2内置94个模块,包含信息收集/存活主机/端口扫描/服务识别/密码爆破/漏洞检测/漏洞利用。漏洞检测含MS17010/SMBGhost/Weblogic/ActiveMQ/Tomcat/Struts2,密码口令爆破(Mysql/Oracle/MSSQL)/FTP/SSH(Linux)/VNC/Windows(IPC/WMI/SMB/Netbios/LDAP/SmbHash/WmiHash/Winrm),远程执行命令(wmiexe/psexec/atexec/sshexec/webshell),降权提权Runas、GetSystem,Poc/Exploit,支持Cobalt Strike 3.X-4.0

  • Updated Jun 6, 2021
  • C#
feroxbuster
secure-77
secure-77 commented Jun 8, 2021

Hi,

first of all, nice and congrats that your tool did it to the new kali release! :)

One little suggestion:
if there is a unexpected parameter/option or error, feroxbuster will print the error and usage message. That is, of course, fine!

In many cases, then i dont want to delete the hole wrong parameter before i knew the correct one, so i just add the --help parameter to the end of my c

Improve this page

Add a description, image, and links to the pentest topic page so that developers can more easily learn about it.

Curate this topic

Add this topic to your repo

To associate your repository with the pentest topic, visit your repo's landing page and select "manage topics."

Learn more