9oelM / elasticpwn
Quickly collect data from thousands of exposed Elasticsearch or Kibana instances and generate a report to be analysed.
☆31Updated 3 years ago
Alternatives and similar repositories for elasticpwn
Users that are interested in elasticpwn are comparing it to the libraries listed below
Sorting:
- A repo for tools, utils, and wrappers that are to small to put in their own repo.☆23Updated 2 years ago
- tool that generates bypasses for open redirects☆52Updated 3 years ago
- Simple Python script to sort nuclei scans by severity and URL☆29Updated last year
- Burp Suite plugin to copy regex matches from selected requests and/or responses to the clipboard.☆34Updated 3 years ago
- Community curated list of templates for the erebus engine to find security vulnerabilities.☆16Updated 3 years ago
- A burp-suite plugin that extract all parameter names from in-scope requests☆29Updated 3 years ago
- A simple tool which makes creating nuclei templates even easier.☆36Updated 10 months ago
- ☆35Updated 3 months ago
- URL scanner for recon, vulnerabilities, secrets and more!☆12Updated 3 years ago
- ☆17Updated 2 years ago
- This includes all the templates of nuclei collected from different sources☆17Updated 2 years ago
- Related subdomains finder☆29Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆57Updated 3 years ago
- Find CVEs that don't have a Detectify modules.☆22Updated 2 years ago
- List of custom Nuclei templates☆15Updated last year
- ☆42Updated 3 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆71Updated 3 years ago
- Template Nuclei SSTI☆29Updated last year
- Nuclei POC 模板☆10Updated 2 years ago
- A simple utility to generate domain names with all possible TLDs☆23Updated 2 years ago
- Repro for Confusion Attacks: Exploiting Hidden Semantic Ambiguity in Apache HTTP Server!☆20Updated 8 months ago
- Burpsuite Plugin to detect Directory Traversal vulnerabilities☆28Updated 3 years ago
- a burp extension for dynamic payload generation to detect injection flaws (RCE, LFI, SQLi), creates access matrix based user sessions to …☆49Updated 3 years ago
- Burp Suite Extensions☆12Updated 3 years ago
- ☆15Updated 2 years ago
- ☆24Updated 4 years ago
- Alias for storing ffuf results☆20Updated 4 years ago
- bug bounty automation☆13Updated 3 years ago
- This tools is use for finding AWS S3 bucket vulrnablity base on hackerone report. Idea of making this tool came from Hackerone report "ht…☆9Updated 5 years ago
- ☆33Updated 3 years ago