SpiderLabs / UPnP-request-generator
A tool to parse UPnP descriptor XML files and generate SOAP control requests for use with Burp Suite or netcat
☆44Updated 11 years ago
Alternatives and similar repositories for UPnP-request-generator:
Users that are interested in UPnP-request-generator are comparing it to the libraries listed below
- Local privilege escalation scripts and tools☆16Updated 8 years ago
- ☆27Updated 7 years ago
- Tools for MITMing Yahoo! Mail with a Wifi Pineapple Mark V and Flash☆28Updated 8 years ago
- A configurable OS shell command injection vulnerability testbed☆15Updated 11 years ago
- Cross Distribution Exploit Testing☆27Updated 9 years ago
- Websocket based egress tester☆20Updated 8 years ago
- Advanced HTTP fingerprinting PoC☆44Updated 7 years ago
- Holepuncher, A wrapper script to open ports in iptables and start a listener.☆32Updated 8 years ago
- ☆15Updated 8 years ago
- CVE-2014-0160 (Heartbeat Buffer over-read bug)☆16Updated 10 years ago
- Bash scripts to help setup port redirects with iptables☆16Updated 7 years ago
- Projects and POCs☆59Updated 10 years ago
- Recon-ng modules that won't get accepted into the main distribution because of 3rd party dependencies.☆18Updated 11 years ago
- packetstormsecurity.net exploit archive 133ch3r☆23Updated 13 years ago
- Burp Notes Extension is a plugin for Burp Suite that adds a Notes tab. The tool aims to better organize external files that are created d…☆67Updated 9 months ago
- Working Rsh Client With Bind/Reverse Shell☆20Updated 9 years ago
- Brisket is a collection of frontend scripts for masscan, zmap, and nmap, in addition data manipulation scripts☆29Updated 10 years ago
- Script to find exploitable magic methods for PHP object injection☆27Updated 10 years ago
- Recursively searches a directory for any file containing a specified string☆45Updated 9 years ago
- PoC exploit code for CVE-2015-5477 BIND9 TKEY remote DoS vulnerability☆14Updated 9 years ago
- An automated Python + Ruby based XXE Exploiter (GUI + CLI)☆20Updated 8 years ago
- Example code for following along with my "Broken, Abandoned, and Forgotten Code" blog series☆25Updated 6 years ago
- Searches for interesting cached DNS entries.☆54Updated 10 years ago
- A reconnaissance tool that can quickly discover hostnames from a list of IP addresses.☆38Updated 14 years ago
- A small wriiteup and a PoC tool about how to use SO_REUSADDR for firewall evasion☆25Updated 9 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆30Updated 9 years ago
- Faraday Workspaces for Bug Bounties☆20Updated 9 years ago
- Proof of concept code (which means poor code quality) for a proxy abusing unrestricted cross domain policies.☆23Updated 11 years ago
- PAC HTTPS leak demo from DEF CON 24 'Toxic Proxies' talk☆29Updated 8 years ago
- Simple Bash script to retrieve basic system information.☆30Updated 6 years ago