Sn1r / Mass-Assigner
Mass Assigner is a simple tool made to probe for mass assignment vulnerability through JSON field modification in HTTP requests
☆12Updated 9 months ago
Alternatives and similar repositories for Mass-Assigner:
Users that are interested in Mass-Assigner are comparing it to the libraries listed below
- ☆27Updated last year
- OMIGOD! OM I GOOD? A free scanner to detect VMs vulnerable to one of the "OMIGOD" vulnerabilities discovered by Wiz's threat research tea…☆18Updated 3 years ago
- OSINT tool abusing SecurityTrails domain suggestion API to find potentially related domains by keyword and brute force.☆26Updated 2 years ago
- A C# Tool to gather information about email breaches☆14Updated last year
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Exploit POC for CVE-2024-22026 affecting Ivanti EPMM "MobileIron Core"☆13Updated 11 months ago
- RepoReaper is an automated tool crafted to meticulously scan and identify exposed .git repositories within specified domains and their su…☆34Updated last year
- ☆12Updated 2 years ago
- Official repository for the Advanced Software Exploitation (ASE) course☆20Updated 6 years ago
- A tool that adds reproducible UUIDs to YARA rules☆13Updated 11 months ago
- A tool to reverse engineer and inspect the RPM and APT databases to list all the packages along with executables, service and versions.☆16Updated 2 months ago
- ☆21Updated last year
- ☆18Updated 4 months ago
- Tool that can be used to trim useless things from a PE file such as the things a file pumper would add.☆26Updated last week
- MacroExploit use in excel sheet☆20Updated last year
- The Catherine Framework is a general-purpose cybersecurity framework built to provide extended support for defense operations.☆16Updated last year
- An exotic service bruteforce tool.☆13Updated this week
- A Python script that gathers all valid IP addresses from all text files from a directory, and checks them against Whois database, TOR rel…☆30Updated 2 years ago
- Bash tool used for proactive detection of malicious activity on macOS systems.☆35Updated last year
- ☆11Updated 3 months ago
- An adaptation of timwhitez's proxycall that uses kernelbase.dll!Beep.☆12Updated last year
- Analyze Windows Systems for common and unique vulnerabilities☆9Updated 2 years ago
- Drakus allows you to monitor the artifacts and domains used in a Red Team exercise to see if they have been uploaded to certain online ma…☆13Updated 4 years ago
- Burp Suite extension for extracting metadata from files☆20Updated 4 years ago
- ☆12Updated 3 years ago
- A straightforward tool for exploiting SMTP Smuggling vulnerabilities.☆15Updated 8 months ago
- Mitigation validation utility for the Ivanti Connect Around attack chain. Runs multiple checks. CVE-2023-46805, CVE-2024-21887.☆12Updated last year
- Automated compromise detection of the world's most popular packages☆15Updated last year
- Code for profiling sandboxes - Initially an idea to profile sandboxes, the code is written to take enviromental variables and send them b…☆20Updated 11 months ago
- ☆17Updated 3 months ago