bcdannyboy / CVE-2023-44487Links
Basic vulnerability scanning to see if web servers may be vulnerable to CVE-2023-44487
☆237Updated last year
Alternatives and similar repositories for CVE-2023-44487
Users that are interested in CVE-2023-44487 are comparing it to the libraries listed below
Sorting:
- Proof of concept for DoS exploit☆55Updated last year
- Community curated list of search queries for various products across multiple search engines.☆191Updated this week
- Nuclei templates for honeypots detection.☆196Updated last year
- A fuzzer for finding anomalies and analyzing how servers respond to different HTTP headers☆341Updated last year
- mx-takeover focuses DNS MX records and detects misconfigured MX records.☆348Updated last year
- Search for sensitive data in Postman public library.☆206Updated 6 months ago
- A lightweight tool for orchestrating and organizing your bug hunting recon / pentesting command-line workflows☆293Updated last year
- ☆205Updated last year
- DockerSpy searches for images on Docker Hub and extracts sensitive information such as authentication secrets, private keys, and more.☆229Updated 11 months ago
- TInjA is a CLI tool for testing web pages for template injection vulnerabilities and supports 44 of the most relevant template engines fo…☆362Updated 2 months ago
- CVE-2024-23897☆197Updated last year
- Catspin rotates the IP address of HTTP requests making IP based blocks or slowdown measures ineffective. It is based on AWS API Gateway a…☆264Updated last year
- 🕵️ Python project to crawl for JavaScript files and search for secrets like API keys, authorization tokens, hardcoded password or relate…☆372Updated last month
- Session Hijacking Visual Exploitation☆201Updated last year
- Zero-dollar attack surface management tool☆295Updated last year
- ☆235Updated last year
- SignSaboteur is a Burp Suite extension for editing, signing, verifying various signed web tokens☆161Updated 7 months ago
- Use favicons to improve your target recon phase. Quickly detect technologies, WAF, exposed panels, known services.☆218Updated 2 weeks ago
- This Python script checks for the CVE-2024-6387 vulnerability in OpenSSH servers. It supports multiple IP addresses, URLs, CIDR ranges, a…☆97Updated last year
- Bypass 4xx HTTP response status codes and more. The tool is based on Python Requests, PycURL, and HTTP Client.☆247Updated 3 months ago
- PETEP (PEnetration TEsting Proxy) is an open-source Java application for traffic analysis & modification using TCP/UDP proxies. PETEP is …☆206Updated last year
- An uber fast and simple subdomain enumeration tool using DNS and web requests with support for detecting wildcard DNS records.☆176Updated last year
- BrowserBruter is a powerful web form fuzzing automation tool designed for web security professionals and penetration testers. This Python…☆306Updated 2 months ago
- WebSocket REPL for pentesters☆220Updated 11 months ago
- An automated tool which can simultaneously crawl, fill forms, trigger error/debug pages and "loot" secrets out of the client-facing code …☆399Updated 5 months ago
- A suite for hunting suspicious targets, expose domains and phishing discovery☆364Updated last month
- OSINT tool that finds domains, subdomains, directories, endpoints and files for a given seed URL.☆177Updated last year
- API Security Vulnerability Scanner designed to help you secure your APIs.☆152Updated this week
- BucketLoot is an automated S3-compatible bucket inspector that can help users extract assets, flag secret exposures and even search for c…☆424Updated 5 months ago
- LEAKEY is a bash script which checks and validates for leaked credentials. The idea behind LEAKEY is to make it highly customizable and e…☆350Updated last year