ctxis / beemka
Basic Electron Exploitation
☆202Updated 5 years ago
Alternatives and similar repositories for beemka:
Users that are interested in beemka are comparing it to the libraries listed below
- DNS Rebinding Exploitation Framework☆488Updated 3 years ago
- Probe a rendering engine for vulnerabilities and other features☆366Updated 3 years ago
- JIRA Secure Attachment Looter☆69Updated 4 years ago
- A simple tool which could be useful to identify the exploits afflicting a Windows OS☆125Updated last year
- A front-end JavaScript toolkit for creating DNS rebinding attacks.☆491Updated 3 years ago
- A Chrome extension static analysis tool to help aide in security reviews.☆150Updated last year
- Application for capturing, modifying and sending custom WebSocket data from client to server and vice versa.☆448Updated 2 years ago
- 🏴☠️ Bypass Same Origin Policy with DNS-rebinding to retrieve local server files 🏴☠️☆197Updated 5 years ago
- Automate common Chrome Debug Protocol tasks to help debug web applications from the command-line and actively monitor and intercept HTTP …☆73Updated 3 years ago
- CLI tool for PKCS7 padding oracle attacks☆135Updated 3 years ago
- A "malicious" DNS server for executing DNS Rebinding attacks on the fly (public instance running on rebind.network:53)☆631Updated 3 years ago
- A collection of useful Serverless functions I use when pentesting☆383Updated 2 years ago
- This small utility retrieves from the CommonCrawl data set unique subdomains for a given domain name.☆158Updated 2 years ago
- PoC code to extract private keys from Windows 10's built in ssh-agent service☆174Updated 6 years ago
- Burp Suite extension to perform Kerberos authentication☆104Updated 7 months ago
- Burp with Friends☆100Updated 2 years ago
- A bash script that automates the exfiltration of data over dns in case we have blind command execution on a server with egress filtering☆209Updated 4 years ago
- Encrypted exploit delivery for the masses☆262Updated 5 years ago
- A tool designed to assist with finding all sinks and sources of a web application and display these results in a digestible manner.☆555Updated last year
- Minimal code to connect to a CEF debugger.☆201Updated 4 years ago
- GTRS - Google Translator Reverse Shell☆616Updated 3 months ago
- locate and attack Lync/Skype for Business☆335Updated 3 months ago
- A powerful target reconnaissance framework powered by graph theory.☆421Updated 2 years ago
- A repo full of example gscripts☆99Updated 5 years ago
- ☆167Updated 5 years ago
- A framework for stealthy domain reconnaissance☆298Updated 3 years ago
- The request.bin of DNS request☆232Updated 6 years ago
- An OSINT tool that discovers sub-domains by searching Certificate Transparency logs☆469Updated 2 years ago
- A simple embedded Linux backdoor.☆195Updated 4 years ago
- Linux privilege escalation checks (systemd, dbus, socket fun, etc)☆289Updated 5 years ago