TheM4hd1 / JCS
Joomla Vulnerability Component Scanner
☆60Updated 6 years ago
Related projects ⓘ
Alternatives and complementary repositories for JCS
- A weaponized version of CVE-2018-9206☆62Updated 6 years ago
- Burp Suite Attack Selector Plugin☆62Updated 7 years ago
- CVE-2020-8012, CVE-2016-10709, CVE-2017-17099, CVE-2017-18047, CVE-2019-1003000, CVE-2018-1999002☆56Updated 4 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Updated 5 years ago
- A PoC Java Stager which can download, compile, and execute a Java file in memory.☆107Updated 6 years ago
- Eternalblue-Doublepulsar without Metasploit or python☆52Updated 5 years ago
- It is a simple script to exploit RCE for Samba (CVE-2017-7494 ).☆55Updated 3 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆37Updated 6 years ago
- A tool to help you manage your leaks☆34Updated 7 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- This tool takes advantage of CVE-2018-11776 and Shodan to perform mass exploitation of verified and vulnerable Apache Struts servers.☆52Updated 6 years ago
- ☆64Updated 6 years ago
- SA-CORE-2018-004 POC #drupalgeddon3☆43Updated 6 years ago
- Discovers and exploits hosts vulnerable to MS08-067/MS17-010☆41Updated 6 years ago
- Oracle WebLogic WLS-WSAT Remote Code Execution Exploit (CVE-2017-10271)☆125Updated 2 years ago
- with metasploit☆62Updated 4 years ago
- CORS checking☆35Updated 6 years ago
- A WebDAV PROPFIND C2 tool☆119Updated 5 years ago
- A CRLF ( Carriage Return Line Feed ) Injection attack occurs when a user manages to submit a CRLF into an application. This is most commo…☆46Updated 2 years ago
- DNS2Proxy offensive proxy version for HSTS☆29Updated 6 years ago
- Brute forcer and shell deployer for WildFly☆100Updated 6 years ago
- Deploy payloads to *Nix systems en masse☆105Updated 4 years ago
- Proof of concept showing how to exploit the CVE-2018-11759☆41Updated 5 years ago
- Metasploit msfvenom Bash Completions Generator☆41Updated 8 years ago