LiamAs05 / Auto-PentesterLinks
Final year project in Magshimim, focusing on Python development and Web Exploitation.
☆10Updated 2 years ago
Alternatives and similar repositories for Auto-Pentester
Users that are interested in Auto-Pentester are comparing it to the libraries listed below
Sorting:
- Detection: Identify the presence of the Ploutus malware by checking for known indicators of compromise (IoCs) such as specific files, reg…☆10Updated last year
- ☆12Updated 5 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆20Updated 5 years ago
- ☆13Updated 2 years ago
- ☆14Updated 10 months ago
- Automatic Mass Tool for check and exploiting vulnerability in CVE-2023-3076 - MStore API < 3.9.9 - Unauthenticated Privilege Escalation (…☆16Updated 2 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 3 years ago
- Introducing the Ransomware Builder – an educational tool with a sleek, modern GUI that makes it easy for anyone to create their own ranso…☆18Updated last year
- PoC for the CVE-2021-20837 : RCE in MovableType☆18Updated 4 years ago
- HTTPFuzzer is a simple python script to perform multiple fuzzing techniques for HTTP protocol☆13Updated 7 years ago
- Official repository of the Blackbuntu pentesting distribution☆12Updated 3 years ago
- A proof of concept for Joomla's CVE-2015-8562 vulnerability (Object Injection RCE)☆10Updated last year
- Buffer_Helper tool have you to discover classic buffer overflow vulnerabilities in application same like "FTP SERVER","FTPClient" etc , …☆15Updated 2 years ago
- PoC ransomware. Inspired by Mr. Robot☆10Updated 4 years ago
- ☆11Updated 4 years ago
- The IDOR IN works by systematically scanning a target web application and examining various endpoints, parameters, and data access points…☆23Updated 2 years ago
- Another pentest of a vulnerable windows server☆15Updated 4 years ago
- Study into generating POC / Exploits for the metasploit framework using LLMs☆13Updated 2 years ago
- Shared library implementations that transform the containing process into a shell when loaded (useful for privilege escalation, argument …☆27Updated last year
- Automate Blind SQL Injection with Python.☆22Updated 3 years ago
- BurpSuite Extension for performing scan via CLI.☆14Updated 8 years ago
- A collection of http fuzzing python scripts to fuzz HTTP servers for bugs.☆16Updated 2 years ago
- https://www.nu11secur1ty.com☆22Updated 3 weeks ago
- Automagically decode DNS Exfiltration queries to convert Blind RCE into proper RCE via Burp Collaborator☆21Updated last month
- Describe how to use ffuf different options with examples☆13Updated 3 years ago
- An ongoing & curated collection of awesome software best practices and techniques, libraries and frameworks, E-books and videos, websites…☆28Updated 3 years ago
- This project is a Python script that exploits the CVE-2023-24489 vulnerability in ShareFile. It allows remote command execution on the ta…☆13Updated 2 years ago
- Apache APISIX Remote Code Execution (CVE-2022-24112) proof of concept exploit☆13Updated 3 years ago
- POC OF CVE-2022-21970☆14Updated 3 years ago
- TL;DR: Mutate a binary to identify potential exploit candidates☆11Updated 3 weeks ago