cyberpunkych / attacking_mongodbLinks
Files from Zeronights presentation.
☆28Updated 13 years ago
Alternatives and similar repositories for attacking_mongodb
Users that are interested in attacking_mongodb are comparing it to the libraries listed below
Sorting:
- Materials related to the 2017 BSides Las Vegas presentation☆52Updated 5 years ago
- Python Implementation of a .NET Padding Oracle Assessment Tool☆31Updated 10 years ago
- Payload generator for Java Binary Deserialization attack with Commons FileUpload (CVE-2013-2186)☆38Updated 9 years ago
- XXE OOB Exploitation Toolset for Automation☆63Updated 12 years ago
- Highlight Burp proxy requests made by different browsers☆29Updated 8 years ago
- Burplay is a Burp Extension allowing for replaying any number of requests using same modifications definition. Its main purpose is to aid…☆83Updated 8 years ago
- ☆32Updated 10 years ago
- Tools developed to test the Redirect to SMB issue☆84Updated 10 years ago
- WhiteBox CMS analysis☆69Updated 2 years ago
- Burp Suite extension to generate Intruder payloads using Radamsa☆89Updated 8 years ago
- ImaegMagick Code Execution (CVE-2016-3714)☆69Updated 9 years ago
- Penetration Testing Tools Developed by AppSec Consulting.☆48Updated 7 years ago
- Python object interface to requests/responses recorded by Burp Suite☆37Updated 6 years ago
- Babel Scripting Framework☆43Updated 5 years ago
- PHDAYS |||☆17Updated 12 years ago
- BurpSuite extension to assist with Automated Forced Browsing/Endpoint Enumeration☆23Updated 7 years ago
- CSV injection Vulnerable Script.☆29Updated 8 years ago
- Spray SMB with hashes, Then psexec☆32Updated 6 years ago
- Pentest Scripts for Apache Vulnerabilities☆30Updated 8 years ago
- An adaptive, intelligent XSS fuzzer that learns how the response is reflected and carefully crafts an XSS payload to match☆42Updated 13 years ago
- Generic Command Exploitation Engine for exploiting web application command-injection bugs,.☆31Updated 12 years ago
- put this here because archival reasons.☆28Updated 7 years ago
- Allows you to trace where inputs are reflected back to the user.☆37Updated 8 years ago
- Scan web server for known webshell names and responses☆50Updated 9 years ago
- Integris Security Carbonator - The Burp Suite Pro extension that automates scope, spider & scan from the command line. Carbonator helps a…☆74Updated 7 years ago
- A SHODAN/Censys + Paramiko scanner to check for backdoored Internet-facing Juniper ScreenOS devices☆66Updated 10 years ago
- ☆23Updated 10 years ago
- A C# web handler that is vulnerable to XXE with PoC. This is to serve as an example of what vulnerable C# code looks like.☆26Updated 12 years ago
- A chef cookbook which can be used to quickly deploy a high interaction honeypot, using the sysdig and falco tools☆41Updated 9 years ago
- The Web Audit Search Engine - Index and Search HTTP Requests and Responses in Web Application Audits with ElasticSearch☆114Updated 5 years ago