LeakIX / estkLinks
ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.
☆86Updated 2 years ago
Alternatives and similar repositories for estk
Users that are interested in estk are comparing it to the libraries listed below
Sorting:
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆117Updated 2 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- SSH Zero-Day Made By ClumsyLulz☆124Updated 6 months ago
- A fingerprint generation helper for nuclei network templates☆74Updated 2 years ago
- Source Code Management Attack Toolkit☆221Updated 3 years ago
- Golang client & library☆101Updated 3 years ago
- PoC for CVE-2022-1388_F5_BIG-IP☆58Updated 3 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated 9 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Nuclei documentation☆84Updated 2 years ago
- D3Ext's Forward Shell☆120Updated last year
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆163Updated 2 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- Subdomains analysis and generation tool. Reveal the hidden!☆243Updated 3 months ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆77Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- Find CVE PoCs on GitHub☆153Updated last month
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆42Updated 5 months ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆205Updated 3 years ago
- Bypass CDN and WAF restrictions using CDN re-fronting.☆256Updated 3 years ago
- Apache Spark Shell Command Injection Vulnerability☆87Updated 3 years ago
- Multi platform toolkit for an interactive DNS shell commands exfiltration, by using DNS-Cat you will be able to execute system commands i…☆114Updated 3 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆75Updated last year
- Repository of CVE found by OCD people☆79Updated 3 months ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆161Updated 4 years ago
- Cloud Exploit Framework☆114Updated 3 years ago