boiledsteak / EJS-Exploit
Remote Code Execution EJS Web Applications using express-fileupload
☆13Updated 3 years ago
Alternatives and similar repositories for EJS-Exploit:
Users that are interested in EJS-Exploit are comparing it to the libraries listed below
- This tool is intended to be used for on target enumeration to gather and exfiltrate information and then to upload tools such as netcat o…☆21Updated last year
- This tool is designed for those situations during a pentest where you have upload access to a webserver that’s running PHP. Upload this …☆17Updated 6 months ago
- all manner of wordlists☆25Updated 3 years ago
- Auto scanning tool that will help you during playing on HackTheBox, TryHackMe...etc☆18Updated last year
- 「🚪」The hidden hookless backdoor☆12Updated 2 months ago
- Bash script to generate reverse shell payloads☆19Updated last year
- This page should help you with the recon for security issues.☆21Updated 2 years ago
- Official Android Pentesting Slide By RootBakar☆15Updated 3 years ago
- Changes the output of Wappalyzer into something human readable. It also provides links to useful websites and a Google query for finding…☆9Updated last year
- ☆21Updated 4 years ago
- Scripts/tools to destroy things☆16Updated 3 years ago
- FETB : Take URL of File For Analysis using File + ExifTool + Binwalk Commands☆22Updated 4 years ago
- A quick and easy to use security reconnaissance webapp tool, does OSINT, analysis and red-teaming in both passive and active mode. Writte…☆27Updated 2 years ago
- [experiment] Generate Nuclei templates for CVEs using chatGPT☆18Updated 3 months ago
- Web CTF CheatSheet 🐈☆33Updated 5 years ago
- This a Complete tool contained box for Capture The Flag competition. Mostly I have inserted all the necessary tools. Some of the people h…☆12Updated 2 years ago
- RDPloit - A Simple Security Vulnerabilities Checker For Remote Desktop Protocol☆31Updated 3 years ago
- A python script to check if URLs are allowed or disallowed by a robots.txt file.☆21Updated last week
- Simple recon tool automates your recon process☆16Updated last year
- ☆9Updated 2 years ago
- parse ffuf & map endpoints to wordlists☆20Updated 3 years ago
- 🖇 Enumerate git repository URL from list of URL / User / Org. Friendly to pipeline☆59Updated 2 months ago
- A python script file to statically and dynamically investigate and analyse binary files for buffer overflow exploits.☆10Updated 8 months ago
- Exploit for the unauthenticated file upload vulnerability in WordPress's Royal Elementor Addons and Templates plugin (< 1.3.79). CVE-ID: …☆10Updated last year
- ☆16Updated 6 months ago
- This tool is developed for burp suite practitioner certificate exam and HTTP Request Smuggling labs. The most important about this tool i…☆17Updated 2 years ago
- Extract endpoints marked as disallow in robots files to generate wordlists.☆56Updated 2 years ago
- Apache Struts 2.3.5 < 2.3.31 / 2.5 < 2.5.10 - Remote Code Execution - Shell Script☆14Updated 6 years ago
- A script written in python3 to spread blind cross-site scripting payloads on HTTP requests headers☆12Updated 2 years ago
- Extract endpoints from specific Git repository for fuzzing☆22Updated 4 years ago