Hex27 / mongomapLinks
A tool inspired by sqlmap specifically for MongoDB Injection
☆31Updated 5 years ago
Alternatives and similar repositories for mongomap
Users that are interested in mongomap are comparing it to the libraries listed below
Sorting:
- Transition form local file inclusion attacks to remote code exection☆66Updated 5 years ago
 - A tool to inspect and attack version 1 GUIDs☆238Updated 3 years ago
 - Werkzeug has a debug console that requires a pin. It's possible to bypass this with an LFI vulnerability or use it as a local privilege e…☆62Updated 2 years ago
 - LFI to RCE via phpinfo() assistance or via controlled log file☆72Updated 2 years ago
 - A couple of different scripts, made to automate attacks against NoSQL databases.☆66Updated last year
 - Content-Security-Policy (CSP) Bypass Techniques☆70Updated 5 years ago
 - Python Duo Push API☆39Updated 5 months ago
 - several list of simple and obfuscate PHP shell☆183Updated 3 years ago
 - PP-finder Help you find gadget for prototype pollution exploitation☆180Updated last year
 - Root shell PoC for CVE-2021-3156☆70Updated 4 years ago
 - ImageMagick LFI PoC [CVE-2022-44268]☆53Updated last year
 - Calculate favicon hash for SHODAN☆88Updated last year
 - A Tool for Domain Flyovers☆121Updated 11 months ago
 - FirebaseExploiter is a vulnerability discovery tool that discovers Firebase Database which are open and can be exploitable. Primarily bui…☆166Updated 2 years ago
 - unleashed ffuf☆224Updated 5 months ago
 - XSS Bypass☆30Updated last year
 - Complex payload encoder☆233Updated last year
 - A Security Tool for Enumerating WebSockets☆362Updated 3 years ago
 - Enumerate / Dump Docker Registry☆180Updated last year
 - WConsole Extractor is a python library which automatically exploits a Werkzeug development server in debug mode. You just have to write a…☆61Updated 4 months ago
 - PHP 8.1.0-dev Backdoor System Shell Script☆95Updated 4 years ago
 - Apache Tomcat exploit and Pentesting guide for penetration tester☆62Updated 3 years ago
 - Unsecure time-based secret exploitation and Sandwich attack implementation Resources☆149Updated 10 months ago
 - ☆42Updated last year
 - Custom scan profiles for use with Burp Suite Pro☆147Updated last year
 - CVE-2017-8917 - SQL injection Vulnerability Exploit in Joomla 3.7.0☆66Updated 3 years ago
 - SSTI Payload Generator☆92Updated 3 years ago
 - A Firefox Web Extension to improve the discovery of DOM XSS.☆279Updated 11 months ago
 - This tool use fuuzzing to try to bypass unknown authentication methods, who knows...☆254Updated last year
 - Phar + JPG Polyglot generator and playground (CTF CODE)☆94Updated 6 years ago