Onapsis / onapsis_icmad_scannerLinks
☆45Updated 3 years ago
Alternatives and similar repositories for onapsis_icmad_scanner
Users that are interested in onapsis_icmad_scanner are comparing it to the libraries listed below
Sorting:
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆102Updated 3 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆88Updated 3 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆67Updated last year
- ☆67Updated 6 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 4 years ago
- Static code analysis tool based on Elasticsearch☆129Updated 4 years ago
- ☆51Updated 3 years ago
- Training course materials and notes related to SAP security audit and penetration testing☆78Updated 4 months ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 2 years ago
- SAP memory pipes(MPI) desynchronization vulnerability CVE-2022-22536.☆51Updated 3 years ago
- SAP Gateway RCE exploits☆156Updated 4 years ago
- CVE-2021-38647 - POC to exploit unauthenticated RCE #OMIGOD☆68Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆143Updated 2 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆30Updated 2 years ago
- ☆22Updated 11 months ago
- Utility for creating ZipSlip archives☆73Updated 2 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆75Updated 2 years ago
- A fingerprint generation helper for nuclei network templates☆75Updated 2 years ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- Source Code Management Attack Toolkit☆219Updated 2 years ago
- ☆54Updated 3 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- ☆26Updated 3 years ago
- a deterministic finite automata ranker☆71Updated 3 years ago
- Repository to store exploits created by Assetnotes Security Research team☆179Updated last year
- ☆101Updated 4 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆72Updated 3 years ago
- A GraphQL enumeration and extraction tool☆131Updated 2 years ago
- Trickest Workflow for discovering log4j vulnerabilities and gathering the newest community payloads.☆112Updated 3 years ago
- Tools to assess the DNS security of web applications☆128Updated 2 years ago