akabe1 / upnp-bhunter
Burp Suite Extension useful to inspect UPnP security
☆16Updated 3 years ago
Alternatives and similar repositories for upnp-bhunter
Users that are interested in upnp-bhunter are comparing it to the libraries listed below
Sorting:
- Exactly what it sounds like, which is something rad☆22Updated 2 years ago
- A tool for the lazy OSINTer that focuses on discovery of subdomains related to a specific domain. The tool will run for free in Google Ap…☆11Updated 4 years ago
- CVE-2020-28243 Local Privledge Escalation Exploit in SaltStack Minion☆17Updated 4 years ago
- The official exploit for OCS Inventory NG v2.7 Remote Command Execution CVE-2020-14947☆19Updated 4 years ago
- CVE-2020-0688☆10Updated 5 years ago
- Some Pentesting Scripts☆11Updated 3 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- CVE-2020-13942 unauthenticated RCE POC through MVEL and OGNL injection☆28Updated 4 years ago
- Do the unexpected with AD GPO processing☆9Updated 6 years ago
- Everything about xss protection technology☆15Updated 5 years ago
- Magento Security Scanner☆15Updated 3 years ago
- RCE in NPM VSCode Extension☆20Updated 4 years ago
- PoC for the CVE-2021-20837 : RCE in MovableType☆19Updated 3 years ago
- Concept:☆11Updated 3 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Automation for grabbing keys from a Linux host. Useful during red team exercises to quickly help assess what access to a Linux host can l…☆16Updated 4 years ago
- treafik fronted c2 examples☆26Updated 4 years ago
- Publishing advisories for CVEs found by POST Cyberforce☆13Updated 4 months ago
- Metasploit Post-Exploitation Gather module for Exchange Server☆25Updated 4 years ago
- Proof of concept about a path traversal vulnerability in Microsoft's Diagcab technology that could lead to remote code execution☆23Updated 2 years ago
- ☆19Updated 4 years ago
- Core bypass Windows Defender and execute any binary converted to shellcode☆43Updated 3 years ago
- A proof-of-concept tool that attempts to retrieve the configuration from the memory dump of an F-Secure C3 Relay executable.☆18Updated 3 years ago
- This repository contains some details about abusing outlook.☆27Updated 6 years ago
- This repository contains several AMSI bypasses. These bypasses are based on some very nice research that has been put out by some awesome…☆24Updated 2 years ago
- ☆20Updated 2 years ago
- Spin up a reverse proxy quickly on Heroku☆14Updated 4 years ago
- Serving files with conditions, serverside keying and more.☆18Updated 2 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- ☆13Updated last year