ajxchapman / CmdRunnerLinks
CmdRunner is a modular command encoder used to easily encode data run through various systems and commands. It's primary use is to run commands on remote systems accessed through multiple hops.
☆16Updated 6 years ago
Alternatives and similar repositories for CmdRunner
Users that are interested in CmdRunner are comparing it to the libraries listed below
Sorting:
- URL-encode data streams via commandline☆14Updated 6 years ago
- This is a Burpsuite plugin built to enable you to import your directory bruteforcing results into burp for easy viewing later. This is an…☆36Updated 2 years ago
- Deploy a Private Burpsuite Collaborator using boto3 Python Library☆58Updated 5 years ago
- ☆46Updated 4 years ago
- Scripts and tools for AWS Pentest☆53Updated 5 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- A collection of OSCE preparation resources.☆24Updated 6 years ago
- Oracle Database Penetration Testing Reference (10g/11g)☆39Updated 7 years ago
- Unique wordlist generator of unique wordlists.☆41Updated 2 years ago
- This repository will serve as the "master" repo containing all trainings and tutorials done in preperation for OSWE in conjunction with t…☆13Updated 6 years ago
- TheCl0n3r will allow you to download and manage your git repositories.☆51Updated 5 years ago
- This is a set of tips and reminders for pentesting processes and scripts/programs. Initially for personal use, but if anyone else finds t…☆52Updated 5 years ago
- Pythonize Intruder Payload☆13Updated 5 years ago
- A simple program to query nmap xml files in the terminal.☆27Updated 5 years ago
- HTML5 Training material for Attack and Secure training sessions.☆44Updated 2 years ago
- This is the Go Server that relays all HTTP requests and responses between clients.☆28Updated 2 years ago
- Tools and resources for web app hacking. The payloads.txt documents are a must have for your Burpsuite intruder payload armory. They've h…☆28Updated 6 years ago
- Another Subdomain ENumeration Tool☆13Updated 3 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Updated 6 years ago
- Scripts to extract files from SCM directories left on web servers☆36Updated 2 years ago
- ☆29Updated 6 years ago
- Jira Secret Hunter - Helps you find credentials and sensitive contents in Jira tickets☆51Updated 3 years ago
- Import Nmap scans to Cherrytree☆36Updated 3 years ago
- Extract credentials from lsass remotely☆16Updated 6 years ago
- JavaScript functions intended to be used as an XSS payload against a WordPress admin account.☆58Updated 5 years ago
- Files and Folders list used in file enumeration during Bug Bounty☆12Updated 5 years ago
- retrive metadata endpoint data with these one liners.☆41Updated 5 years ago
- OWASP Foundation Web Respository☆36Updated 4 years ago
- Mole is a framework for identifying and exploiting out-of-band application vulnerabilities.☆58Updated 5 years ago
- A colorful cross-platform python script to test misconfigurations of AWS S3 buckets both through authenticated and unauthenticated checks…☆39Updated 4 years ago