boiledsteak / EJS-Exploit
Remote Code Execution EJS Web Applications using express-fileupload
☆12Updated 3 years ago
Alternatives and similar repositories for EJS-Exploit:
Users that are interested in EJS-Exploit are comparing it to the libraries listed below
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated last year
- Web crawler and downloader based on GNU Wget.☆12Updated last year
- All Shell In One. Generate Reverse Shells and/or generate single code that runs all the payloads.☆11Updated 4 years ago
- Priv8 Tools Software Mass Dork Auto Exploit.☆13Updated 2 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆17Updated 4 months ago
- Search for sensitive data in Postman public library. Original work from https://github.com/cosad3s/postleaks☆26Updated last year
- Small python or powershell script to look for potential subdomain takeover vulnerabilities via vulnerable Alias.☆8Updated 3 years ago
- ShellC0de Generator☆11Updated 3 years ago
- ☆12Updated last year
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 4 years ago
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆18Updated 7 months ago
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆9Updated last year
- ☆19Updated 2 years ago
- 「🚪」The hidden hookless backdoor☆12Updated 3 months ago
- Coyote is a standalone C# post-exploitation implant for maintaining access to compromised Windows infrastructure during red team engageme…☆19Updated 2 years ago
- Blind SQL Injection (BSQLI) Data Exploration Tool☆18Updated 8 years ago
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- A simple command line tool designed to explore the mechanics of dictionary attacks on the FTP protocol.☆20Updated 3 years ago
- Fast DNS history enumeration tool for network and OSINT investigations☆17Updated 4 years ago
- Bash script to generate reverse shell payloads☆19Updated last year
- ☆13Updated 2 weeks ago
- Some useful scripts for CobaltStrike☆10Updated 6 years ago
- DNS hijacking via dead records automation tool☆52Updated 4 years ago
- A fully automated, accurate, and extensive scanner for finding log4j RCE CVE-2021-44228☆12Updated 3 years ago
- This tool will help in generating reverse shells easily for all types of OS.☆19Updated last year
- Simple recon tool automates your recon process☆16Updated last year
- A simple tool to check subdomains for clickjacking attack.☆12Updated 4 years ago
- A server side template injection vulnerability in CrushFTP in all versions before 10.7.1 and 11.1.0 on all platforms allows unauthenticat…☆8Updated 11 months ago