bcdannyboy / CVE-2023-44487Links
Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487
☆242Updated 2 years ago
Alternatives and similar repositories for CVE-2023-44487
Users that are interested in CVE-2023-44487 are comparing it to the libraries listed below
Sorting:
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆265Updated last year
- Proof of concept for DoS exploit☆54Updated 2 years ago
- ☆197Updated 2 years ago
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆358Updated 2 years ago
- Nuclei templates for honeypots detection.☆196Updated 2 years ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆98Updated last year
- Session Hijacking Visual Exploitation☆209Updated last year
- Community curated list of search queries for various products across multiple search engines.☆354Updated this week
- Search for sensitive data in Postman public library.☆213Updated 4 months ago
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆163Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆353Updated 2 years ago
- Scripts that are intended to help you in your pen-testing and bug-hunting efforts by automating various manual tasks, making your work mo…☆94Updated 3 months ago
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆334Updated 4 months ago
- My useful files for penetration tests, security assessments, bug bounty and other security related stuff☆190Updated this week
- GBounty is a multi-step website vulnerability scanner developed in Golang designed to help companies, pentesters, and bug hunters identif…☆158Updated 4 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆299Updated 2 years ago
- Tools for finding SMTP smuggling vulnerabilities.☆143Updated last year
- Google Calendar RAT is a PoC of Command&Control over Google Calendar Events☆260Updated 4 months ago
- Docker Remote API Scanner and Exploit☆180Updated 2 years ago
- DNSWatch - DNS Traffic Sniffer and Analyzer☆212Updated 10 months ago
- CVE-2024-23897☆201Updated last year
- A suite for hunting suspicious targets, expose domains and phishing discovery☆373Updated last month
- Huge Collection of Wordpress Exploits and CVES☆124Updated 3 years ago
- FlowMate, a BurpSuite extension that brings taint analysis to web applications, by tracking all parameters send to a target application a…☆164Updated 2 months ago
- Zero-dollar attack surface management tool☆310Updated last year
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆380Updated 2 years ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆398Updated 2 weeks ago
- ☆236Updated last year
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆223Updated this week
- DNSleuth sniffs DNS packets, i.e, allowing you to spy on the DNS queries your machine is making☆102Updated 2 years ago