HTTPoxy Exploit Scanner by 1N3 @CrowdShield
☆104Aug 9, 2017Updated 8 years ago
Alternatives and similar repositories for HTTPoxyScan
Users that are interested in HTTPoxyScan are comparing it to the libraries listed below
Sorting:
- MassBleed SSL Vulnerability Scanner☆247Apr 18, 2020Updated 5 years ago
- A small python script to check for Cross-Site Tracing (XST)☆133Jan 23, 2016Updated 10 years ago
- Exploits by 1N3 @CrowdShield @xer0dayz @XeroSecurity☆205Sep 27, 2021Updated 4 years ago
- Supermicro IPMI/BMC Cleartext Password Scanner☆41Sep 6, 2015Updated 10 years ago
- DirDar is a tool that searches for (403-Forbidden) directories to break it and get dir listing on it☆13Mar 5, 2021Updated 5 years ago
- Linux vulnerability scanner based on Salt Open and Vulners audit API, with Slack notifications and JIRA integration☆262Oct 18, 2017Updated 8 years ago
- Network white noise collector☆19Mar 23, 2016Updated 9 years ago
- Advanced Web Shell☆580May 1, 2017Updated 8 years ago
- A collection of Windows, Linux and MySQL privilege escalation scripts and exploits.☆985Dec 13, 2017Updated 8 years ago
- Find exploits in local and online databases instantly☆1,811Sep 27, 2021Updated 4 years ago
- Fuzzing tool written in Golang. Insane monkey not included.☆12Feb 22, 2018Updated 8 years ago
- Intelligent threat hunter and phishing servers☆47Jan 20, 2019Updated 7 years ago
- Automates some pentest jobs via nmap xml file☆325Sep 7, 2018Updated 7 years ago
- Express security essentials deployment for Linux Servers☆60Oct 19, 2020Updated 5 years ago
- This is the vulnerable "proxy" I used on this article: http://resources.infosecinstitute.com/the-ssrf-vulnerability/ . A simple, non-vali…☆14Sep 20, 2016Updated 9 years ago
- OWASP VBScan is a Black Box vBulletin Vulnerability Scanner☆328Jun 16, 2019Updated 6 years ago
- A graphical security analysis tool for IoT networks☆200Apr 17, 2019Updated 6 years ago
- Extract Juniper firewall usernames and hashes and put into a John the Ripper format for cracking☆13Jul 4, 2014Updated 11 years ago
- WhiteBox CMS analysis☆69May 22, 2023Updated 2 years ago
- A shellcode testing harness.☆70Jul 10, 2024Updated last year
- Automatically Launch Google Hacking Queries Against A Target Domain☆740Mar 5, 2024Updated 2 years ago
- Find unreferenced AWS S3 buckets which have CloudFront CNAME records pointing to them☆36Jul 3, 2018Updated 7 years ago
- psychoPATH - an advanced path traversal tool. Features: evasive techniques, dynamic web root list generation, output encoding, site map-s…☆278Feb 12, 2021Updated 5 years ago
- JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool☆12Feb 7, 2018Updated 8 years ago
- minimal script to help find script into the nse database☆133Jul 10, 2018Updated 7 years ago
- Bypassing User Account Control (UAC) using TpmInit.exe☆131Sep 26, 2016Updated 9 years ago
- WS-Attacker is a modular framework for web services penetration testing. It is developed by the Chair of Network and Data Security, Ruhr …☆491Oct 3, 2024Updated last year
- Automated Linux evil maid attack☆436Dec 22, 2015Updated 10 years ago
- ☆99May 3, 2018Updated 7 years ago
- Deploy payloads to *Nix systems en masse☆108Apr 24, 2020Updated 5 years ago
- Wordpress XMLRPC System Multicall Brute Force Exploit (0day) by 1N3 @ CrowdShield☆493Aug 10, 2025Updated 7 months ago
- [L]ocal [A]uto [R]oot [E]xploiter is a simple bash script that helps you deploy local root exploits from your attacking machine when your…☆67Jun 30, 2017Updated 8 years ago
- unix wildcard attacks☆138May 25, 2018Updated 7 years ago
- Bypass 4xx HTTP response status codes and more. Based on PycURL.☆16Jun 27, 2022Updated 3 years ago
- Linux Automatic ARP (TCP / UDP / ICMP) Firewall☆83Oct 24, 2019Updated 6 years ago
- DNS-Shell is an interactive Shell over DNS channel☆531Oct 11, 2020Updated 5 years ago
- It's a tool to manage vulnerables packages in your *nix server, in a centralized way☆30Dec 15, 2020Updated 5 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- A tool to analyse JMX API security level.☆44Jul 23, 2014Updated 11 years ago