Hancheng-Lei / Hacking-Vulnerability-CVE-2020-1938-GhostcatLinks
☆16Updated 2 years ago
Alternatives and similar repositories for Hacking-Vulnerability-CVE-2020-1938-Ghostcat
Users that are interested in Hacking-Vulnerability-CVE-2020-1938-Ghostcat are comparing it to the libraries listed below
Sorting:
- Just learning around new stuff mostly Red Teaming and such but will try to see if I can update or simplify them more, nothing too exotic …☆43Updated 3 years ago
- Automated HTTP Request Repeating With Burp Suite☆38Updated 2 years ago
- HTTP requests of FrontPage expolit☆25Updated 11 years ago
- Wounty is a simple web enumeration script that makes use of other popular tools to automate the early stages of recognition in Bug Bounty…☆14Updated 3 years ago
- ☆27Updated 2 years ago
- ☆29Updated 2 years ago
- OWASP Foundation Web Respository☆36Updated 3 years ago
- H&E- Burp Highlighter and Extractor☆18Updated 2 years ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- ☆26Updated 3 years ago
- Noob Penetration tester☆11Updated last year
- ☆36Updated 5 months ago
- Automated compromise detection of the world's most popular packages☆15Updated last year
- ☆19Updated 4 years ago
- Accompanying material needed for the workshop☆11Updated 2 years ago
- ☆21Updated last month
- My fuzz repo!☆22Updated last year
- Nuclei template to detect Apache servers vulnerable to CVE-2024-38473☆28Updated 10 months ago
- Enumerate AWS cloud resources based on provided credential☆51Updated 3 years ago
- XSS scanning with Dalfox on Github-action☆25Updated last year
- Tool to extract & validate google fcm server keys from apks☆28Updated 4 years ago
- an Evil Java RMI Registry.☆50Updated 2 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆57Updated 4 years ago
- Just some random small tools for dealing with asp.net Forms Authentication Cookies☆24Updated 3 years ago
- Anvil Secure's Burp extension for signing AWS requests with SigV4☆21Updated 7 months ago
- A Burp Extender plugin that will allow you to tamper with requests containing compressed, serialized java objects.☆24Updated 6 years ago
- https://www.nu11secur1ty.com☆23Updated last month
- C2Matrix Automation☆11Updated last year
- This tool is useful in case you want to evade the detection based on simple rules when trying to dump the SAM, SYSTEM or SECURITY hives u…☆10Updated 2 years ago
- ElasticSearch exploit and Pentesting guide for penetration tester☆29Updated 2 years ago