ambionics / prestashop-exploitsLinks
Collection of exploits/POC for PrestaShop cookie vulnerabilities (CVE-2018-13784)
☆48Updated 6 years ago
Alternatives and similar repositories for prestashop-exploits
Users that are interested in prestashop-exploits are comparing it to the libraries listed below
Sorting:
- Modified version of ActiveScan++ Burp Suite extension☆31Updated 8 years ago
- Parse X509 certificates to get the (sub)domains in it.☆28Updated 6 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 9 years ago
- PHP tool to test XSS☆22Updated 5 years ago
- Generate pentest reports based on github issues.☆17Updated 2 years ago
- Encima De la Mosca HTTP proxy POC for infecting files on-the-fly and SSLstrip2☆41Updated 6 years ago
- Repo for proof of concept exploits and tools.☆56Updated 4 years ago
- Scan for open S3 buckets and dump☆37Updated 7 years ago
- Multithreaded Padding Oracle Attack on Oracle OAM (CVE-2018-2879)☆25Updated 5 years ago
- Burp plugin to do random fuzzing of HTTP requests☆33Updated 8 years ago
- Tool to identify if a domain is a CMS such as Wordpress, Moodle, Joomla, Drupal or Prestashop☆111Updated 6 years ago
- a parser + crawler for .DS_Store files exposed publically☆55Updated last year
- SA-CORE-2018-004 POC #drupalgeddon3☆42Updated 7 years ago
- A collection of published exploits and proof-of-concept code.☆21Updated 7 years ago
- A Burp Suite content discovery plugin that add the smart into the Buster!☆31Updated 7 years ago
- PrestaShop (1.6.x <= 1.6.1.23 or 1.7.x <= 1.7.4.4) Back Office Remote Code Execution (CVE-2018-19126)☆40Updated 6 years ago
- Python tool for expired domain discovery in crossdomain.xml files☆23Updated 8 years ago
- This repository contains the POC of an exploit for node-jose < 0.11.0☆25Updated 2 years ago
- Finally, reverse/bind shells written in python, encrypted with ssl!☆39Updated 5 years ago
- Python script which will type a file into an RDP session. For when drag and drop and disk mounting is not possible☆32Updated last year
- ☆38Updated 4 years ago
- Various tools for managing bug bounty recon and exploration.☆47Updated 2 years ago
- Enumerate subdomains through Virustotal☆32Updated 5 years ago
- Self defense post module for metasploit☆17Updated 5 years ago
- ☆1Updated 6 years ago
- A Burp Suite extension that automatically marks similar requests as 'out-of-scope'.☆43Updated 5 years ago
- ☆20Updated 5 years ago
- Burp Suite Professional extension in Java for Tabnabbing attack☆13Updated 7 years ago
- Terraform configuration to build a Burp Private Collaborator Server☆25Updated 7 years ago
- ☆27Updated 5 years ago