GKNSB / LepusLinks
Subdomain finder
☆15Updated last year
Alternatives and similar repositories for Lepus
Users that are interested in Lepus are comparing it to the libraries listed below
Sorting:
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆58Updated 5 years ago
- Writeup of CVE-2020-15906☆49Updated 5 years ago
- SQL injection script for MSSQL that extracts domain users from an Active Directory environment based on RID bruteforcing☆91Updated 5 years ago
- Tests for LFI in PHP apps and automates the process of leveraging LFI's to recursively download source code and discover new files via in…☆13Updated 3 years ago
- BurpSuite's payload-generation extension aiming at applying fuzzed test-cases depending on the type of payload (integer, string, path; JS…☆40Updated 4 years ago
- A proof-of-concept tool for generating payloads that exploit unsafe Java object deserialization.☆43Updated 5 years ago
- A tool for creating proxy dll for hijacking☆42Updated last year
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- Python Script to Exploit SpoolService/Printer Bug on Exchange - Thanks to @3xocyte☆22Updated 6 years ago
- ☆16Updated 3 years ago
- Convert ldapdomaindump to Bloodhound☆80Updated 2 years ago
- Vulnerable webapp testbed☆24Updated 9 years ago
- Extract subdomains from rapiddns.io☆23Updated 3 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Copy as XMLHttpRequest BurpSuite extension☆32Updated 4 years ago
- A Red Team tool for exfiltrating sensitive data from Jira tickets.☆86Updated 2 years ago
- ☆34Updated last year
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- ☆22Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- HTML source files demonstrating HTML5 postmessage vulnerabilities☆20Updated 5 years ago
- offensive notes & resources☆43Updated 10 months ago
- Generate a dynamic PAC script that will route traffic to your Burp proxy only if it matches the scope defined in your Burp target.☆34Updated 4 years ago
- "Powershell script assisting with domain enumerating and in finding quick wins" - Basically written while doing the 'Advanced Red Team' l…☆82Updated 4 years ago
- A Burp Suite extension for headless, unattended scanning.☆36Updated 5 years ago
- A mirror of several precompiled standalone red-teaming tools.☆19Updated 3 years ago
- The tool exfiltrates data from Couchbase database by exploiting N1QL injection vulnerabilities.☆77Updated 5 years ago
- A web shell for pivoting and lateral movement☆33Updated 8 years ago
- ☆73Updated 7 years ago
- User enumeration and password spraying tool for testing Azure AD☆71Updated 3 years ago