aidanhs / tclscanLinks
Scans tcl for command injection
☆18Updated 5 years ago
Alternatives and similar repositories for tclscan
Users that are interested in tclscan are comparing it to the libraries listed below
Sorting:
- Network based steganography based control channels and chat.☆8Updated 9 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆12Updated 6 years ago
- Windows SSPI wrapper in prue python☆15Updated last year
- Burp Suite Pro extension☆10Updated 8 years ago
- module for certexfil☆15Updated 2 years ago
- How to write inline c# in xaml☆8Updated 11 years ago
- Proof-of-Concept exploit of CVE-2018-19131: Squid Proxy XSS via X.509 Certificate☆20Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 2 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆12Updated 6 years ago
- Slides and demo code for past presentations☆11Updated 3 years ago
- CVE-2019-10149 privilege escalation☆9Updated 5 years ago
- Used to manage burp extensions that I find useful.☆11Updated 3 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 5 years ago
- A PoC that shows that Web Vulnerabilities can indeed be interesting☆20Updated 7 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆24Updated 6 years ago
- burp extender for fuzzing☆10Updated 6 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 5 years ago
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- Files used for various testing methodologies.☆13Updated 8 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Paper, data and code from Investigating Potential Security Vulnerability Manifestation through Various Analyses & Inferences Regarding In…☆18Updated 4 years ago
- Golang port for Metasploit's pattern_create and pattern_offset☆13Updated 4 years ago
- ☆1Updated 6 years ago
- Scans an internal network using massscan and nmap☆20Updated last year
- ☆14Updated 5 years ago
- ☆19Updated 8 years ago
- Checks for search order privilege escalation vectors in system environment, system shared objects and executable files in $PATH.☆18Updated 3 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago