D3vil0p3r / catanaLinks
CATANA - CUT your Wordlist!
☆14Updated 2 years ago
Alternatives and similar repositories for catana
Users that are interested in catana are comparing it to the libraries listed below
Sorting:
- Simple CLI tool for the generation of downloader oneliners for UNIX-like or Windows systems☆44Updated 4 years ago
- F5 BIG-IP iControl REST vulnerability RCE exploit with Java including a testing LAB☆12Updated 2 years ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆28Updated last year
- A multi-threaded password sprayer based on Medusa, built for distributed spraying.☆37Updated 3 years ago
- cvet is a Python utility for pulling actionable vulnerabilities from cvetrends.com☆39Updated 3 years ago
- Youtube as covert-channel - Control systems remotely and execute commands by uploading videos to Youtube☆108Updated last year
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- List of fresh and validated DNS resolvers updated every 12h.☆23Updated last week
- URL / IP / Email defanging with Javascript. Make IoC harmless.☆32Updated 10 months ago
- Classic Web shell upload techniques & Web RCE techniques☆38Updated 10 months ago
- CLI & library to search for default credentials among thousands of Products / Vendors☆68Updated 4 years ago
- Highly configurable script for dictionary/spray attacks against online web applications.☆53Updated 2 years ago
- Automated HTTP Request Repeating With Burp Suite☆39Updated 2 years ago
- This is a python script that exploits wget when being set with a SUID bit, and overwrites the root password.☆40Updated last year
- Interactive navi redteam cheats☆32Updated 2 months ago
- ☆29Updated 2 years ago
- 「💥」CVE-2022-33891 - Apache Spark Command Injection☆26Updated 3 years ago
- 「🚪」Linux Backdoor based on ICMP protocol☆63Updated 9 months ago
- This script implements the Proof of Concept attack from the Checkpoint research "NTLM Credentials Theft via PDF Files"☆27Updated 7 years ago
- Simple recon tool automates your recon process☆17Updated 2 years ago
- A python approach to interacting with web shells.☆30Updated 4 years ago
- Most common AWS S3 bucket names.☆27Updated 5 years ago
- ☆74Updated last year
- The largest collection of wordlists in yaml for bug bounty tools☆36Updated last year
- Command-line tool to enumerate top-level domains, check response codes and find potential vulnerabilities for bug bounty hunters and secu…☆26Updated 2 years ago
- Get GTFOBins info about a given exploit from the command line☆40Updated last year
- Gofrette is a reverse shell payload developed in Golang that bypasses Windows defender and many others anti-virus.☆41Updated 2 years ago
- Python Penetration Testing Tools☆17Updated 2 months ago
- ☆27Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago