BishopFox / bigip-scanner
Determine the running software version of a remote F5 BIG-IP management interface.
☆66Updated last year
Alternatives and similar repositories for bigip-scanner:
Users that are interested in bigip-scanner are comparing it to the libraries listed below
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆83Updated last year
- User enumeration and password spraying tool for testing Azure AD☆69Updated 3 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- C2 Automation using Linode☆80Updated 2 years ago
- Red Teaming & Active Directory Cheat Sheet.☆40Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆67Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated last year
- A "Spring4Shell" vulnerability scanner.☆49Updated last month
- ElasticSearch exploit and Pentesting guide for penetration tester☆25Updated 2 years ago
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆86Updated last year
- Nmapurls parses Nmap xml reports from either piped input or command line arg and outputs a list of http(s) URL's to be used in an automat…☆39Updated last year
- Tool to perform GCP Domain Wide Delegation abuse and access Gmail and Drive data☆44Updated last year
- CVE-2023-34362: MOVEit Transfer Unauthenticated RCE☆62Updated 11 months ago
- ☆34Updated 2 years ago
- Enumerate valid users within Microsoft Teams and OneDrive with clean output.☆58Updated last month
- A BurpSuite extension to deploy an OpenVPN config file to DigitalOcean and set up a SOCKS proxy to route traffic through it☆49Updated last year
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 2 years ago
- Enumerate AWS cloud resources based on provided credential☆50Updated 2 years ago
- Next generation fireprox AWS API endpoint creation utility.☆49Updated 2 years ago
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆38Updated 2 years ago
- ☆27Updated 2 years ago
- Automating Juicy Potato Local Privilege Escalation CMD exploit for penetration testers.☆39Updated 2 years ago
- ☆74Updated 8 months ago
- ☆53Updated 2 years ago
- Striping CDN IPs from a list of IP Addresses☆75Updated 2 years ago
- A National Vulnerability Database (NVD) API query tool☆18Updated last year
- Upload files done during my research.☆134Updated 2 months ago
- C# tool to discover low hanging fruits☆91Updated 2 years ago
- POC for Veeam Backup and Replication CVE-2023-27532☆63Updated last year
- ☆52Updated last year