EgeBalci / TicketbleedLinks
This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.
☆28Updated 8 years ago
Alternatives and similar repositories for Ticketbleed
Users that are interested in Ticketbleed are comparing it to the libraries listed below
Sorting:
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Efficient clustering of MASSCAN results☆12Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆31Updated 11 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 6 years ago
- ☆57Updated 8 years ago
- Tool for finding KPOT XOR key using known-plaintext attack.☆13Updated 5 years ago
- WebBorer is a directory-enumeration tool written in Go.☆44Updated 2 years ago
- AV Bypass☆29Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 7 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆20Updated 7 years ago
- Telegram notification for metasploit sessions.☆14Updated 6 years ago
- Strutsy - Mass exploitation of Apache Struts (CVE-2017-5638) vulnerability☆10Updated 6 years ago
- MalRecon - Basic Malware Reconnaissance and Analysis Tool☆26Updated 8 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- Offline Security Focus Database☆31Updated 12 years ago
- DoS PoC's for SAP products☆52Updated 7 years ago
- Post Exploitation Linux Toolkit☆33Updated 8 years ago
- Environmental (and http) keying for scripting languages☆39Updated 6 years ago
- A tiny chrome extension to record and replay your web application proof-of-concepts.☆20Updated 8 years ago
- Of the thousands of lazy reconnaissance scripts, this one is by far the one in this repository.☆11Updated 4 years ago
- Issues to consider when planning a red team exercise.☆15Updated 7 years ago
- Mapping of Binaries that allows Arbitrary Code Execution☆25Updated 7 years ago
- Remote timing attack exploit against most Zeus/Zbot variants including Citadel, Ice9, Zeus 2.3, KINS/ZeusVM etc..☆24Updated 9 years ago
- Crawl certificate information from censys☆8Updated 8 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆64Updated 9 years ago
- This script generate backdoor code which log username password of an user who have passed HTTP basic auth using LDAP credentials.☆58Updated 8 years ago
- Faraday Workspaces for Bug Bounties☆21Updated 9 years ago
- Python script to efficiently find files on UNIX like file systems with specific properties (quicker than find)☆18Updated 9 years ago