-
Updated
Nov 19, 2021 - Python
pentesting
Here are 1,956 public repositories matching this topic...
-
Updated
Apr 14, 2021
-
Updated
Nov 24, 2021 - JavaScript
-
Updated
Nov 26, 2021 - Shell
-
Updated
Nov 17, 2021 - Python
-
Updated
Nov 26, 2021 - Python
-
Updated
Oct 31, 2021 - Python
The only working feedback when submitting the Change Password form is the success notification in this.confirmation. No error message is ever displayed on screen. The corresponding code blocks are reached for the expected error conditions, but the this.error field is never shown on screen.
I testing bruteforce my opencart store.
this is body request:
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"
^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"
^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?
-
Updated
Sep 28, 2021
-
Updated
Nov 24, 2021 - Python
-
Updated
Oct 21, 2021 - Go
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Nov 26, 2021 - Shell
-
Updated
Nov 22, 2021 - CSS
-
Updated
Nov 26, 2021 - Python
What would you like added?
Common Platform Enumeration (CPE) is a structured naming scheme for information technology systems, software, and packages. Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name.
The usage of CPE naming is
-
Updated
Oct 26, 2021 - Shell
-
Updated
Nov 27, 2021 - Python
-
Updated
Jul 8, 2021
-
Updated
Oct 22, 2021 - Ruby
Hey, here we need add url decoding cuz that invalid link with symbols of get request like ?, &, = etc
p.s thx for awesome tool
-
Updated
Nov 11, 2021 - Python
-
Updated
Mar 16, 2021 - Python
-
Updated
Sep 1, 2021
-
Updated
Aug 28, 2021 - Shell
-
Updated
Nov 24, 2021 - Python
Improve this page
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."

Hey Hackers of this spoopy month!👻
Welcome to the Ciphey repo(s)!
This issue requires you to add a decoder.
This wiki section walks you through EVERYTHING you need to know, and we've added some more links at the bottom of this issue to detail more about the decoder.
https://github.com/Ciphey/Ciphey/wiki#adding-your-own-crackers--decoders
https://www.dcode.fr/t9-cipher
https://en.wikipe