aidanhs / tclscan
Scans tcl for command injection
☆17Updated 5 years ago
Alternatives and similar repositories for tclscan:
Users that are interested in tclscan are comparing it to the libraries listed below
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- Scans tcl for command injection☆36Updated 5 years ago
- Network based steganography based control channels and chat.☆8Updated 8 years ago
- Virtual host brute forcer☆22Updated 11 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- A modular pentesting framework implemented in C☆14Updated 6 years ago
- My collection of exploit development skeletons for fuzzing, overwriting the stack, remote code execution, etc.☆16Updated last week
- Get a list of installed software in a safe manner☆11Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 5 years ago
- ☆14Updated 7 years ago
- NMAP NSE script for detecting devices that speak the Crimson v3 protocol☆11Updated 10 years ago
- An offensive bash script which tries to find GENERIC privesc vulnerabilities and issues.☆13Updated 7 years ago
- Lightweight and extensible horizontal vulnerability scanner☆11Updated 2 years ago
- Organise and access data collected during internal network pentests☆10Updated 4 years ago
- Vulnerable XSLT Console Application☆10Updated 7 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆19Updated 7 years ago
- Flame - Send vulnerabilities reports to SIEM☆15Updated 8 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆15Updated 10 months ago
- ☆17Updated 6 years ago
- a dumb protocol-unaware packet fuzzer/replayer☆23Updated 7 years ago
- Tools for auditing WAFS☆19Updated 3 years ago
- Burp Suite Pro extension☆10Updated 7 years ago
- TLS SNI virtual hosts bruteforcer☆21Updated 10 years ago
- AppSecurityLimits - Allows Executables To Define Security Limits☆17Updated 5 years ago
- The Exploitation Toolkit Icarus is a cross platform software exploitation library that assists in the development of proof of concept exp…☆17Updated 11 years ago
- Automate Recon process using Shell Scripting☆11Updated 3 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆18Updated 5 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆24Updated 5 years ago