EgeBalci / TicketbleedLinks
This is a tool for exploiting Ticketbleed (CVE-2016-9244) vulnerability.
☆30Updated 8 years ago
Alternatives and similar repositories for Ticketbleed
Users that are interested in Ticketbleed are comparing it to the libraries listed below
Sorting:
- ☆22Updated 9 years ago
- For educational purposes only, use at your own responsibility. metasploit_rc_scripts - contains either sample rc files for explatation o…☆21Updated 8 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆65Updated 9 years ago
- Inspired by https://github.com/djadmin/awesome-bug-bounty, a list of bug bounty write-up that is categorized by the bug nature☆25Updated 8 years ago
- Automatically parses and attacks BloodHound-generated graphs☆41Updated 7 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Babel Scripting Framework☆43Updated 4 years ago
- A collection of scripts made duing my personal research☆29Updated 6 years ago
- Advanced Vulnerable Web Application (AVWA)☆14Updated 8 years ago
- Basic gui to run and display nmap scan results. Just a POC so far.☆30Updated 11 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- Cronbased Dirty Cow Exploit☆31Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- A platform to run private unannounced Honeypots as Tor Hidden Services (aka Onion Decoys) inside the Tor Network.☆25Updated 8 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 8 years ago
- Collection of tools for web recon and enumeration.☆56Updated 10 years ago
- An example of obtaining RCE via Redis and CSRF☆76Updated 9 years ago
- Files from Zeronights presentation.☆28Updated 12 years ago
- PLASMA PULSAR☆69Updated 8 years ago
- Splunk Web Shell☆50Updated 10 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- Nashorn Post Exploitation☆32Updated 7 years ago
- Simple DDE object detector☆56Updated 7 years ago
- Stækka Metasploit - Extenting Metasploit☆54Updated 8 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managed…☆55Updated 8 years ago
- ☆47Updated 9 years ago
- DoS PoC's for SAP products☆52Updated 7 years ago
- Metasploit Framework with Viproy installed.☆36Updated 8 years ago
- Slides from my ShellCon Talk, OSINT for Pen Tests, given 10/19.☆60Updated 7 years ago