Pepelux / stuncheckLinks
Set of tools to audit and exploit STUN/TURN servers
☆32Updated 2 months ago
Alternatives and similar repositories for stuncheck
Users that are interested in stuncheck are comparing it to the libraries listed below
Sorting:
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆165Updated last year
- Fragtunnel is a proof-of-concept (PoC) TCP tunnel tool that you can use to tunnel your application's traffic and bypass next-generation f…☆220Updated last year
- 😹 Python project to bruteforce Apache Tomcat manager login with known-default credentials☆99Updated last year
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆165Updated 3 months ago
- The Template Injection Table is intended to help during the testing of an application for template injection vulnerabilities.☆103Updated 6 months ago
- The perfect butler for pentesters, bug-bounty hunters and security researchers☆93Updated 2 years ago
- PyCript Websocket is now merge into https://github.com/Anof-cyber/PyCript, this repo is not available anymore.☆82Updated last month
- WPXStrike is a script designed to escalate a Cross-Site Scripting (XSS) vulnerability to Remote Code Execution (RCE) or other's criticals…☆71Updated 2 years ago
- External recon toolkit☆54Updated last year
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆224Updated 2 years ago
- A Burp Suite extension for finding DNS vulnerabilities in web applications!☆92Updated 2 years ago
- WEB-Wordlist-Generator creates related wordlists after scanning your web applications.☆52Updated last year
- A fast enumeration tool for publicly exposed Azure Storage blobs.☆116Updated 2 years ago
- ☆106Updated 3 years ago
- A python3 script searching for secret on swaggerhub☆66Updated 3 years ago
- ☆198Updated 3 years ago
- TunnelX is a lightweight ingress tunneling tool designed to create a secure SOCKS5 proxy server for routing network traffic.☆65Updated 2 months ago
- A rapid HTTP downgrade smuggling scanner written in Go.☆311Updated last year
- Session Hijacking Visual Exploitation☆210Updated last year
- SubSnipe is a tool designed to help find subdomains that are vulnerable to takeover.☆131Updated last year
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- CLI & library to search for default credentials among thousands of Products / Vendors☆55Updated last month
- Tool to enable blind sql injection attacks against websockets using sqlmap☆66Updated 9 months ago
- Automate converting webshells into reverse shells.☆72Updated 3 weeks ago
- Extracting OSINT Insights from 15TB of GitHub Event Logs☆68Updated 2 years ago
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆266Updated last year
- ☆173Updated 6 months ago
- Burp Extension to add additional functionality for pentesting websocket based applications☆103Updated 5 months ago
- CVE-2024-21893: SSRF Vulnerability in Ivanti Connect Secure☆96Updated 2 years ago
- Burp extension for Recursive Request Exploits (RRE) — DEFCON 2025☆117Updated 2 weeks ago