-
Updated
Dec 31, 2021 - Python
pentesting
Here are 2,020 public repositories matching this topic...
-
Updated
Apr 14, 2021
-
Updated
Dec 12, 2021 - JavaScript
-
Updated
Jan 2, 2022 - Shell
-
Updated
Feb 17, 2021
-
Updated
Dec 20, 2021 - Python
-
Updated
Jan 1, 2022 - Python
-
Updated
Oct 31, 2021 - Python
-
Updated
Jan 2, 2022 - TypeScript
Can we have a feature where a normal brute force is running based on HTTP response like 403/401 do a recursive brute force on that endpoint?
I testing bruteforce my opencart store.
this is body request:
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="username"
^USER^
-----------------------------34237939373614592773956005873
Content-Disposition: form-data; name="password"
^PASS^
-----------------------------34237939373614592773956005873
Content-Disposition: form-dat
-
Updated
Dec 23, 2021
-
Updated
Dec 17, 2021 - Python
-
Updated
Jan 1, 2022 - Go
RustScan has an accessible mode, rustscan --accessible which should promise not to have any weird ASCII text in it.
Write CI that runs RustScan with --accessible a few times, with different flags / options and check the terminal output to see if it contains one of these:
[!][~][>]| {}
If any of these characters appear in any of the tests, fail the CI. E
-
Updated
Jan 2, 2022 - Shell
-
Updated
Dec 26, 2021 - CSS
-
Updated
Dec 11, 2021 - Python
What would you like added?
Common Platform Enumeration (CPE) is a structured naming scheme for information technology systems, software, and packages. Based upon the generic syntax for Uniform Resource Identifiers (URI), CPE includes a formal name format, a method for checking names against a system, and a description format for binding text and tests to a name.
The usage of CPE naming is
-
Updated
Dec 23, 2021 - Shell
-
Updated
Jan 2, 2022 - Python
-
Updated
Jul 8, 2021
-
Updated
Dec 16, 2021 - Ruby
Hey, here we need add url decoding cuz that invalid link with symbols of get request like ?, &, = etc
p.s thx for awesome tool
-
Updated
Jan 2, 2022 - Go
-
Updated
Dec 28, 2021 - Python
-
Updated
Mar 16, 2021 - Python
-
Updated
Aug 28, 2021 - Shell
Improve this page
Add a description, image, and links to the pentesting topic page so that developers can more easily learn about it.
Add this topic to your repo
To associate your repository with the pentesting topic, visit your repo's landing page and select "manage topics."

Hey Hackers of this spoopy month!👻
Welcome to the Ciphey repo(s)!
This issue requires you to add a decoder.
This wiki section walks you through EVERYTHING you need to know, and we've added some more links at the bottom of this issue to detail more about the decoder.
https://github.com/Ciphey/Ciphey/wiki#adding-your-own-crackers--decoders
https://www.dcode.fr/t9-cipher
https://en.wikipe