LeakIX / estkLinks
ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.
☆88Updated 2 years ago
Alternatives and similar repositories for estk
Users that are interested in estk are comparing it to the libraries listed below
Sorting:
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆119Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆80Updated 3 years ago
- Nuclei documentation☆86Updated 2 years ago
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆122Updated 3 years ago
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆101Updated 3 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆162Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Updated 3 weeks ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated last year
- Repository of CVE found by OCD people☆83Updated 7 months ago
- ☆54Updated 4 years ago
- Find CVE PoCs on GitHub☆160Updated 6 months ago
- Golang client & library☆105Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 5 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆208Updated 4 years ago
- 🌒 Shell command obfuscation to avoid detection systems☆122Updated 3 years ago
- D3Ext's Forward Shell☆120Updated 2 years ago
- Exploit code for Jira Mobile Rest Plugin SSRF (CVE-2022-26135)☆88Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- Safely detect whether a FortiGate SSL VPN instance is vulnerable to CVE-2023-27997 based on response timing☆134Updated last year
- Bypass CDN and WAF restrictions using CDN re-fronting.☆262Updated 3 years ago
- Apache commons text - CVE-2022-42889 Text4Shell proof of concept exploit.☆56Updated 2 years ago
- Scanner for CVE-2023-22515 - Broken Access Control Vulnerability in Atlassian Confluence☆78Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago