1N3 / jexboss
JexBoss: Jboss (and Java Deserialization Vulnerabilities) verify and EXploitation Tool
☆11Updated 6 years ago
Related projects: ⓘ
- scripts to setup pentesting system and use during pentest☆18Updated 2 years ago
- ☆19Updated this week
- Open-source Exploiting Framework☆29Updated 7 years ago
- Check your email(s) using popular online services to see if it appears in any data-breach☆27Updated 2 months ago
- Scrape pastes from pastebin and archive them for review☆16Updated 5 years ago
- trolo - an easy to use script for generating Payloads that bypasses antivirus☆48Updated 7 years ago
- pentest toolbox☆28Updated 2 years ago
- This tool queries the emails that registered the domain and verifies if they were leaked in some data leak.☆67Updated 5 years ago
- ☆19Updated 9 years ago
- [BASH] Password generator through a wordlist☆12Updated 11 years ago
- AIL framework - Analysis Information Leak framework☆8Updated 6 years ago
- Automated Google dorking with custom search engines☆26Updated 4 years ago
- ☆16Updated this week
- A tool for the persistent XSS exploitation with a focus for mobile web browsers☆54Updated 3 years ago
- Shodan.io Command Line Interface☆44Updated 3 years ago
- A default credential scanner.☆9Updated 5 years ago
- An0n 3xPloiTeR Shell☆35Updated 4 years ago
- Software exploitation training material☆14Updated 7 years ago
- This tool aims at automating the identification of potential service running behind ports identified manually either through manual scan …☆50Updated 3 years ago
- A Bash script to test a list of URLs for the shellshock vulnerability.☆25Updated 4 years ago
- 📡 A security research tool with shodan integration☆24Updated 6 years ago
- Passphrase wordlist and hashcat rules for offline cracking of long, complex passwords☆12Updated 6 years ago
- Generate customized and undetectable exploits for Metasploit.☆22Updated 7 years ago
- A simple script for translating IP addresses to GeoLocations☆36Updated 2 years ago
- A web app scanner☆26Updated 10 years ago
- a collection of payloads for common webapps☆73Updated 11 years ago
- Identify the different types of hashes used to encrypt passwords.☆9Updated 7 years ago
- Multi source CVE/exploit parser.☆27Updated 7 years ago
- Perform various SMB-related attacks, particularly useful for testing large Active Directory environments.☆40Updated last year
- Bypass XSS Reflected Cross-site scripting☆29Updated 8 years ago