LeakIX / l9fuzzLinks
Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload
☆11Updated 3 years ago
Alternatives and similar repositories for l9fuzz
Users that are interested in l9fuzz are comparing it to the libraries listed below
Sorting:
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 7 months ago
- Very loud vBulletin exploit☆14Updated 5 years ago
- ☆12Updated last year
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- Tricard - Malware Sandbox Fingerprinting☆20Updated last year
- A basic proxylogon scanner☆27Updated 4 years ago
- A mini project to exfiltrate data via QR codes☆19Updated 2 weeks ago
- Invanti VPN Vulnerabilities for Jan - Feb 2024 - Links to Keep it all Organized☆16Updated last year
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- #️⃣ 🕸️ 👤 HTTP Headers Hashing☆13Updated last year
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- A tool to parse, deduplicate, and query multiple port scans.☆59Updated 2 years ago
- Exploit PoC for CVE's and non CVE's alike☆22Updated 5 years ago
- Proof of Concept Exploit for ManageEngine ServiceDesk Plus CVE-2021-44077☆35Updated 3 years ago
- donLoader is a shellcode loader creation tool that uses donut to convert executable payloads into shellcode to evade detection on disk.☆20Updated 3 years ago
- just manipulatin these here tokens yes sir nothing weird☆22Updated 3 years ago
- ☆42Updated 4 months ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 6 years ago
- Red Team C2 and Post Exploitation code☆37Updated last month
- A little implant which SSH's back with a shell☆38Updated 3 years ago
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- DLL hijacking vulnerability scanner and PE infector tool☆18Updated 7 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- USB HID driver emulation with PID/VID (0x3bca/0x27bb) of Plenom A/S Busylight Alpha, that is supported by Mimikatz. When mimikatz is exec…☆20Updated 2 years ago
- A Docker container used to easily compile Nim binaries generated by my tools (NimPackt and NimPlant)☆16Updated last year
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- A set of YARA rules for the AIL framework to detect leak or information disclosure☆38Updated 6 months ago
- Log converter from CS log to Ghostwriter CSV☆30Updated 4 years ago
- Take a list of URIs and print all the of the paths☆10Updated 5 years ago