LeakIX / estkLinks
ES ToolKit is a standalone solution to navigate and backup data for a wide range of Elasticsearch and Kibana versions.
☆88Updated 2 years ago
Alternatives and similar repositories for estk
Users that are interested in estk are comparing it to the libraries listed below
Sorting:
- This little tool is to calculate a MurmurHash value of a favicon to hunt phishing websites on the Shodan platform.☆119Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆77Updated 3 years ago
- A cli for cracking, testing vulnerabilities on Json Web Token(JWT)☆136Updated 2 months ago
- Fast and lightweight Web Application Firewall Fingerprinting tool☆64Updated 11 months ago
- SCodeScanner stands for Source Code scanner where the user can scans the source code for finding the Critical Vulnerabilities.☆163Updated 2 years ago
- An extensible, end-to-end encrypted reverse shell that works across networks without port forwarding.☆99Updated 2 months ago
- Nuclei documentation☆85Updated 2 years ago
- pFuzz helps us to bypass web application firewall by using different methods at the same time.☆161Updated 4 years ago
- Source Code Management Attack Toolkit☆225Updated 3 years ago
- IP/FQDN data structure helper with randomization of hosts and ports based on masscan internal logic☆68Updated last year
- ☆54Updated 4 years ago
- DNSrr is a tool written in bash, used to enumerate all the juicy stuff from DNS.☆121Updated 3 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Automated penetration and auxiliary systems, providing XSS, XXE, DNS log, SSRF, RCE, web netcat and other Servers,gin-vue-admin,online ht…☆149Updated last week
- Citrix Scanner for CVE-2023-3519☆52Updated 2 years ago
- Dockerized POC for CVE-2022-42889 Text4Shell☆76Updated 3 years ago
- The purpose of this project is to demonstrate the Log4Shell exploit with Log4J vulnerabilities using PDF as delivery channel☆206Updated 3 years ago
- Golang client & library☆104Updated 3 years ago
- Run all your bug bounty VPN profiles in parallel and expose them via multiple local SOCKS proxies.☆111Updated 4 years ago
- Cloud Exploit Framework☆114Updated 3 years ago
- SQLMap wrapper that lets you use Interact.sh as a DNS server for exfiltrating data with zero configuration☆45Updated 7 months ago
- Bypass CDN and WAF restrictions using CDN re-fronting.☆260Updated 3 years ago
- CVE-2021-34473 Microsoft Exchange Server Remote Code Execution Vulnerability☆30Updated 4 years ago
- Repository of CVE found by OCD people☆82Updated 5 months ago
- A fast tool to mass scan for a vulnerability on Microsoft Exchange Server that allows an attacker bypassing the authentication and impers…☆161Updated 3 years ago
- Automated privilege escalation of the world's most popular Docker images.☆69Updated 2 years ago
- Looking for JAR files that are vulnerable to Log4j RCE (CVE‐2021‐44228)?☆45Updated 3 years ago
- First iteration of ML based Feedback WAF☆59Updated last year
- Vulnerable Client-Server Application (VuCSA) is made for learning how to perform penetration tests of non-http thick clients. It is writt…☆98Updated 2 years ago
- A simple HTTP server for delivering and exfiltrating files/data during, for example, CTFs.☆80Updated 4 months ago