1N3 / Exploits
Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
☆201Updated 3 years ago
Alternatives and similar repositories for Exploits:
Users that are interested in Exploits are comparing it to the libraries listed below
- Local File Inclusion Exploitation Tool (mirror)☆125Updated 8 years ago
- A unique automated LFi Exploiter with Bind/Reverse Shells☆279Updated 9 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆285Updated 5 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆254Updated 10 months ago
- ☆193Updated 6 years ago
- An exploitation shell focusing on exploiting command injection vulnerabilities, eg., LFI, RFI, SSTI, etc.☆171Updated last year
- MassBleed SSL Vulnerability Scanner☆243Updated 5 years ago
- Based on URL and Organization Name, collect the IP Ranges, subdomains using various tools like Amass, subfinder, etc.. And check for upho…☆157Updated last year
- search for hosts info with shodan☆231Updated 3 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆221Updated 10 months ago
- Burp Suite extension to discover assets from HTTP response.☆225Updated 3 months ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 6 months ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- VPN pentest tools and scripts☆125Updated 7 years ago
- Penetration testing scripts☆142Updated 6 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- An extremely fast and flexible web fuzzer☆218Updated 2 years ago
- SQL Injection Payloads for Burp Suite, OWASP Zed Attack Proxy,...☆231Updated 5 years ago
- Collection of different exploits☆182Updated 4 years ago
- a tiny tool for swf hacking, just browse it:)☆243Updated 12 years ago
- My collection of metasploit auxiliary post-modules☆191Updated 5 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- Automates some pentest jobs via nmap xml file☆324Updated 6 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆227Updated 7 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆314Updated 3 years ago
- Github for the scripts utilised during Penetration test☆234Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆262Updated 7 years ago
- Automated reconnaissance wrapper — TomNomNom's meg on steroids. [DEPRECATED]☆307Updated 6 years ago
- A free software to find the components installed in Joomla CMS, built out of the ashes of Joomscan.☆222Updated last year