killchain-compendium/Exploits/References.md

39 lines
1.1 KiB
Markdown

# Exploit References
[PayloadsAllTheThings](https://github.com/swisskyrepo/PayloadsAllTheThings.git)
## Recover git Repositories
[Internetwache's gitTools](https://github.com/internetwache/GitTools.git)
## Web
[Padbuster - padding Oracle Attacks](https://github.com/AonCyberLabs/PadBuster.git)
## Printer Exploitation
[RUB-NDS Printer Exploitation Framework](https://github.com/RUB-NDS/PRET.git)
## Python
[pwntools doc](https://docs.pwntools.com/en/stable/)
[pwntools installation](https://docs.pwntools.com/en/stable/install.html)
## Java
[fullhunt's log4j-scan](https://github.com/fullhunt/log4j-scan.git)
[pimps' JNID-Exploit-Kit](https://github.com/pimps/JNDI-Exploit-Kit.git)
## Linux
[DirtyPipe](https://github.com/cspshivam/CVE-2022-0847-dirty-pipe-exploit.git)
## macOS
[DS Store Crawler Parser](https://github.com/anantshri/DS_Store_crawler_parser.git)
[DS Store Exp](https://github.com/lijiejie/ds_store_exp.git)
[DS Store Exp Python3](https://github.com/qiuluo-oss/ds_store_exp_py3.git)
## Windows
[PowerSploit](https://github.com/PowerShellMafia/PowerSploit.git)
[nishang](https://github.com/samratashok/nishang.git)