Onapsis / onapsis_icmad_scannerLinks
☆45Updated 3 years ago
Alternatives and similar repositories for onapsis_icmad_scanner
Users that are interested in onapsis_icmad_scanner are comparing it to the libraries listed below
Sorting:
- ☆73Updated 7 years ago
- Training course materials and notes related to SAP security audit and penetration testing☆84Updated 11 months ago
- Determine the Palo Alto PAN-OS software version of a remote GlobalProtect portal or management interface.☆128Updated last year
- Spring Framework RCE (CVE-2022-22965) Nmap (NSE) Checker (Non-Intrusive)☆101Updated 3 years ago
- SAP Gateway RCE exploits☆157Updated 5 years ago
- Static code analysis tool based on Elasticsearch☆130Updated 5 years ago
- Tools to assess the DNS security of web applications☆128Updated 3 years ago
- ☆51Updated 3 years ago
- A simple remote scanner for Atlassian Jira☆121Updated 3 years ago
- Find the remote website version based on a git repository☆126Updated 4 years ago
- BurpSuite Extension: A one-stop pen testing checklist and logger tool☆76Updated 3 years ago
- PoC for CVE-2020-6207 (Missing Authentication Check in SAP Solution Manager)☆81Updated 5 years ago
- F5 BIG-IP RCE exploitation (CVE-2022-1388)☆87Updated 3 years ago
- Programmatically create hunting rules for deserialization exploitation with multiple keywords, gadget chains, object types, encodings, an…☆144Updated 2 years ago
- ☆170Updated 4 years ago
- Python script for SAP secure storage decrypton☆13Updated 7 years ago
- Recurrent Neural Network SubDomain Discovery Tool☆95Updated 3 years ago
- Simple extension that allows to run nuclei scanner directly from burp and transforms json results into the issues.☆31Updated 2 years ago
- Workshop given at Hack in Paris 2019☆126Updated 2 years ago
- Determine the running software version of a remote F5 BIG-IP management interface.☆69Updated 2 years ago
- Creates a malicious ODF document help leak NetNTLM Creds☆37Updated 2 years ago
- Perform TE.CL HTTP Request Smuggling attacks by crafting HTTP Request automatically.☆73Updated 3 years ago
- Upload files done during my research.☆169Updated last month
- A tool for performing light brute-forcing of HTTP servers to identify commonly accessible NTLM authentication endpoints.☆105Updated 2 years ago
- RCE for Pega Infinity >= 8.2.1, Pega Infinity <= 8.5.2☆60Updated 4 years ago
- The Burp extension to check JWT (JSON Web Tokens) for using keys from known from public sources☆138Updated 5 years ago
- Citrix Scanner for CVE-2023-3519☆53Updated 2 years ago
- Searching for virtual hosts among non-resolvable domains☆88Updated 5 years ago
- A list of "secrets" from JWT sample code and readme files.☆57Updated 5 years ago
- PoC for CVE-2020-6287, CVE-2020-6286 (SAP RECON vulnerability)☆224Updated 5 years ago