NetSPI / BurpCollaboratorDNSTunnel
A DNS tunnel utilizing the Burp Collaborator
☆101Updated 5 years ago
Alternatives and similar repositories for BurpCollaboratorDNSTunnel:
Users that are interested in BurpCollaboratorDNSTunnel are comparing it to the libraries listed below
- Burp Suite plugin created for using Collaborator tool during manual testing in a comfortable way!☆103Updated 6 years ago
- Python script to exploit java unserialize on t3 (Weblogic)☆61Updated 7 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆55Updated 3 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆126Updated 2 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆54Updated 8 years ago
- Burp Suite Attack Selector Plugin☆60Updated 7 years ago
- siberas JMX exploitation toolkit☆130Updated 2 years ago
- An interactive OOB XXE data exfiltration tool☆90Updated 7 years ago
- Java serialization brute force attack tool.☆123Updated 7 years ago
- Custom THP Dropper☆26Updated 7 years ago
- Metasploit msfvenom Bash Completions Generator☆42Updated 8 years ago
- CVE-2018-7600 - Drupal 7.x RCE☆71Updated 7 years ago
- Burp Suite Extensions☆127Updated 11 years ago
- WebLogic Exploit☆142Updated 6 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- Test CVE-2018-0296 and extract usernames☆106Updated 6 years ago
- Exploit for the Post-Auth RCE vulnerability in Pulse Secure Connect☆132Updated 3 years ago
- a simple portforwarder in ps1 with embeded c# code☆90Updated 6 years ago
- ☆42Updated 5 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- Automates credential skimming from service accounts in Windows Registry☆75Updated 4 years ago
- Dirbuster plugin for Burp Suite☆70Updated 8 years ago
- Takes a URL and checks the system for the tilde enum vuln and then find the files.☆171Updated 6 years ago
- Bash script that tests if a system is Winshock (MS14-066) vulnerable☆100Updated 10 years ago
- Python script to exploit CVE-2015-4852.☆30Updated 8 years ago
- checkO365 is a tool to check if a target domain is using O365☆84Updated 6 years ago
- Environment for CVE-2019-6340 (Drupal)☆43Updated last year
- CVE-2018-2893-PoC☆103Updated 6 years ago
- This is a Metasploit module which exploits CVE-2017-11882 using the POC released here : https://embedi.com/blog/skeleton-closet-ms-office…☆99Updated 7 years ago