QeeqBox (qeeqbox)

QeeqBox

qeeqbox

Geek Repo

State-of-the-art opensource projects and services for red, purple, and blue teams

Location:Washington, USA

Home Page:qeeqbox.com

Github PK Tool:Github PK Tool

QeeqBox's repositories

social-analyzer

API, CLI, and Web App for analyzing and finding a person's profile in 1000 social media \ websites

Language:JavaScriptLicense:AGPL-3.0Stargazers:11192Issues:358Issues:70

stored-cross-site-scripting

An adversary may inject malicious content into a vulnerable target

License:AGPL-3.0Stargazers:4Issues:1Issues:0

client-side-template-injection

A threat actor may trick a victim into executing native template syntax on a vulnerable target

License:AGPL-3.0Stargazers:3Issues:2Issues:0

dom-based-cross-site-scripting

A threat actor may inject malicious content into HTTP requests. The content is not reflected in the HTTP response and executed in the victim's browser.

License:AGPL-3.0Stargazers:3Issues:1Issues:0

open-redirect

A threat actor may send a malicious redirection request for a vulnerable target to a victim; the victim gets redirected to a malicious website that downloads an executable file

License:AGPL-3.0Stargazers:3Issues:1Issues:0

risk-management

Risk management is the process of identifying, assessing, treating, and monitoring any negative events that affect a company's ability to operate (Preventing them or minimizing their harmful impact)

License:AGPL-3.0Stargazers:3Issues:1Issues:0

vertical-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a higher privileges level

License:AGPL-3.0Stargazers:3Issues:1Issues:0

authentication-bypass

A threat actor may gain access to data and functionalities by bypassing the target authentication mechanism

License:AGPL-3.0Stargazers:2Issues:1Issues:0

captcha-bypass

A threat actor may bypass the Completely Automated Public Turing test to tell Computers and Humans Apart (captcha) by breaking the solving logic, human-assisted solving services, or utilizing automated technology

License:AGPL-3.0Stargazers:2Issues:2Issues:0

data-compliance

Data compliance is the process of following various regulations and standards to ensure that sensitive digital assets (data) are guarded against loss, theft, and misuse

License:AGPL-3.0Stargazers:2Issues:1Issues:0

horizontal-privilege-escalation

A threat actor may perform unauthorized functions belonging to another user with a similar privileges level

License:AGPL-3.0Stargazers:2Issues:1Issues:0

session-fixation

A threat actor may trick a user into using a known session identifier to log in. after logging in, the session identifier is used to gain access to the user's account

License:AGPL-3.0Stargazers:2Issues:1Issues:0

session-hijacking

A threat actor may access the user's account using a stolen or leaked valid (existing) session identifier

License:AGPL-3.0Stargazers:2Issues:1Issues:0

two-factor-authentication-brute-force

A threat actor may lunch brute force to the two-factor authentication (2FA) logic causing unauthorized access to the target

License:AGPL-3.0Stargazers:2Issues:1Issues:0

xslt-injection

A threat actor may interfere with an application's processing of extensible stylesheet language transformations (XSLT) for extensible markup language (XML) to read or modify data on the target

License:AGPL-3.0Stargazers:2Issues:2Issues:0

xxe-injection

A threat actor may interfere with an application's processing of extensible markup language (XML) data to view the content of a target's files

License:AGPL-3.0Stargazers:2Issues:1Issues:0

access-control

Access Control is using security techniques to protect a system against unauthorized access

License:AGPL-3.0Stargazers:1Issues:1Issues:0

cross-site-request-forgery

A threat actor may trick an authenticated or trusted victim into executing unauthorized actions on their behalf

License:AGPL-3.0Stargazers:1Issues:1Issues:0

data-classification

Data classification defines and categorizes data according to its type, sensitivity, and value

License:AGPL-3.0Stargazers:1Issues:1Issues:0

data-security

Safeguarding your personal information (How your info is protected)

License:AGPL-3.0Stargazers:1Issues:1Issues:0

identity-and-access-management

The practice of ensuring that people or objects have the right level of access to assets

License:AGPL-3.0Stargazers:1Issues:1Issues:0

insecure-deserialization

A threat actor may tamper with a stream that gets deserialized on the target, causing the target to access data or perform non-intended actions

License:AGPL-3.0Stargazers:1Issues:1Issues:0

local-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve local file

License:AGPL-3.0Stargazers:1Issues:1Issues:0

os-command-injection

A threat actor may inject arbitrary operating system (OS) commands on target

License:AGPL-3.0Stargazers:1Issues:1Issues:0

remote-file-inclusion

A threat actor may cause a vulnerable target to include/retrieve remote file

License:AGPL-3.0Stargazers:1Issues:1Issues:0

security-controls

Countermeasures or safeguards for detecting, preventing, and mitigating cyber threats and attacks (Protect assets)

License:AGPL-3.0Stargazers:1Issues:1Issues:0

server-side-template-injection

A threat actor may alter the template syntax on the vulnerable target to execute commands

License:AGPL-3.0Stargazers:1Issues:1Issues:0

session-replay

A threat actor may re-use a stolen or leaked session identifier to access the user's account

License:AGPL-3.0Stargazers:1Issues:1Issues:0

sql-injection

A threat actor may alter structured query language (SQL) query to read, modify and write to the database or execute administrative commands for further chained attacks

License:AGPL-3.0Stargazers:1Issues:1Issues:0

xpath-injection

A threat actor may alter the XML path language (XPath) query to read data on the target

License:AGPL-3.0Stargazers:1Issues:1Issues:0