1N3 / ExploitsLinks
Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity
☆202Updated 3 years ago
Alternatives and similar repositories for Exploits
Users that are interested in Exploits are comparing it to the libraries listed below
Sorting:
- A unique automated LFi Exploiter with Bind/Reverse Shells☆279Updated 9 years ago
- SQLiPy is a Python plugin for Burp Suite that integrates SQLMap using the SQLMap API.☆255Updated 2 weeks ago
- Local File Inclusion Exploitation Tool (mirror)☆127Updated 8 years ago
- Penetration testing scripts☆143Updated 7 years ago
- Wordlist for content(directory) bruteforce discovering with Burp or dirsearch☆214Updated 7 months ago
- MassBleed SSL Vulnerability Scanner☆243Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connections☆286Updated 6 years ago
- Script to test for Cisco ASA path traversal vulnerability (CVE-2018-0296) and extract system information.☆203Updated last year
- A Burp Suite content discovery plugin that add the smart into the Buster!☆383Updated 4 years ago
- Collection of different exploits☆182Updated 4 years ago
- A tool to find and exploit servers vulnerable to Shellshock☆333Updated 2 years ago
- A series of python scripts for generating weird character combinations for bypassing web application firewalls (WAF) and XSS blockers☆276Updated 6 years ago
- WPSploit - Exploiting Wordpress With Metasploit☆227Updated 7 years ago
- An implementation of NSA's ExplodingCan exploit in Python☆263Updated 7 years ago
- Automated client-side template injection (sandbox escape/bypass) detection for AngularJS v1.x.☆316Updated 3 years ago
- A tool to generate media files with malicious metadata☆124Updated 6 years ago
- a tiny tool for swf hacking, just browse it:)☆242Updated 12 years ago
- HTTPoxy Exploit Scanner by 1N3 @CrowdShield☆103Updated 7 years ago
- Pemburu AKA GoldDigger.☆70Updated 5 years ago
- kadimus is a tool to check and exploit lfi vulnerability.☆536Updated 4 years ago
- Human and machine readable web vulnerability testing format☆190Updated 2 years ago
- Script to automate PUT HTTP method exploitation to get shell☆125Updated 4 years ago
- ☆194Updated 6 years ago
- Github for the scripts utilised during Penetration test☆235Updated 7 years ago
- Some tools to automate recon - 003random☆294Updated 6 years ago
- An extremely fast and flexible web fuzzer☆218Updated 2 years ago
- Analysing parameters with all payloads' bypass methods, aiming at benchmarking security solutions like WAF.☆221Updated last year
- Search Exploitable Software on Linux☆228Updated 2 years ago
- Relational database brute force and post exploitation tool for MySQL and MSSQL☆224Updated 11 months ago
- A little collection of fun and creative proof of concepts to demonstrate the potential impact of a security vulnerability.☆163Updated 5 years ago