aidanhs / tclscanLinks
Scans tcl for command injection
☆17Updated 5 years ago
Alternatives and similar repositories for tclscan
Users that are interested in tclscan are comparing it to the libraries listed below
Sorting:
- PoCs discovered through fuzzing which resulted in a CVE assignment.☆18Updated 5 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago
- Local enumeration and exploitation framework.☆18Updated 8 years ago
- This is a SOAP service written in C# that has intentional SQL injection vulnerabilties.☆21Updated 9 years ago
- A bunch of tricks and configs to configure a work environment for web pentesting☆13Updated 7 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Updated 9 years ago
- Frontend to import Nmap Scan in ES, and frontend to make search☆10Updated 11 years ago
- Hunt for and Exploit the libSSH Authentication Bypass (CVE-2018-10933)☆10Updated 7 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 6 years ago
- Useful Windows and AD tools☆15Updated 3 years ago
- Asynchronous MSF RPC API wrapper☆20Updated 3 years ago
- ☆38Updated 5 years ago
- A number of scripts POC's and problems solved as pentests move along.☆44Updated last year
- Burp extension for automated handling of CSRF tokens☆16Updated 7 years ago
- XXE attack tool☆31Updated 9 years ago
- ☆13Updated 5 years ago
- ☆18Updated 7 years ago
- simple python socket connection to test if exim is vulnerable to CVE-2019-10149. The payload simply touch a file in /tmp/eximrce.☆13Updated 6 years ago
- Exploit Research & Development - Ported Exploits☆11Updated 8 years ago
- A semi fast tool to bruteforce values of LDAP injections over HTTP.☆14Updated 12 years ago
- Working exploit code for CVE-2019-17625☆19Updated 5 years ago
- My solutions in Python for Corelan's Exploit Writing Tutorials☆13Updated 9 years ago
- Binary String Toolkit (BST). Quickly and easily convert binary strings for all your exploit development needs.☆23Updated 7 years ago
- String or worldlist encoder for use in fuzzing or web application testing☆19Updated 6 years ago
- CVE-2017-8570 Exploit☆21Updated 8 years ago
- CVE-2019-12949☆26Updated 6 years ago
- How to write basic memory corruption exploits on Windows☆28Updated 9 years ago
- LEMPO (Ldap Exposure on POrtainer) is an exploit for CVE-2018-19466 (LDAP Credentials Disclosure on Portainer). Featured @ DevFest Siberi…☆11Updated 5 years ago
- Generate pentest reports based on github issues.☆16Updated 3 years ago
- Screenshot Shenanigans☆26Updated 8 years ago