darrenmartyn / vBulldozerLinks
Very loud vBulletin exploit
☆14Updated 4 years ago
Alternatives and similar repositories for vBulldozer
Users that are interested in vBulldozer are comparing it to the libraries listed below
Sorting:
- Take a list of URIs and print all the of the paths☆10Updated 4 years ago
- A parallel scanner that utilises axiom to spin up servers and parallel scan using masscan.☆16Updated 5 years ago
- A multi-threaded scanner that helps identify CORS flaws/misconfigurations☆19Updated 5 years ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Updated 5 years ago
- Nmap NSE script to detect Pulse Secure SSL VPN file disclosure CVE-2019-11510☆18Updated 5 years ago
- Scripts for OSCE☆18Updated 6 years ago
- Screenshot Shenanigans☆26Updated 7 years ago
- A playground to practice SSRF Attacks against web apps☆17Updated 6 years ago
- ☆20Updated 5 years ago
- It becomes the extension of Burp suite. The cookie set by the BipIP server may include a private IP, which is an extension to detect tha…☆16Updated last year
- Abusing SketchUp to make persistence on Windows☆21Updated 6 years ago
- An information gathering tool to collect git emails in version control host services☆11Updated 6 years ago
- s3eker is an extensible way to find open S3 buckets.☆17Updated 4 years ago
- a parser + crawler for .DS_Store files exposed publically☆55Updated 2 years ago
- A collection of python apps and shell scripts to email an xlsx spreadsheet of new vulnerabilities in the NIST CVE database and their asso…☆12Updated 4 years ago
- A basic proxylogon scanner☆27Updated 3 years ago
- Hostile Dropboxes Management☆26Updated 5 years ago
- Identify common attack paths to get Domain Administrator☆22Updated 5 years ago
- LetMeOutOfYour.net Resources☆20Updated 4 years ago
- Automated Payload Test Controller☆10Updated 8 years ago
- Kubernetes Scanner☆40Updated 3 years ago
- Attacking and defending web and VPN session hijacking in Pulse Secure Connect☆14Updated 5 years ago
- A simple grep user interface for searching code which can be used for SAST.☆8Updated 5 years ago
- Supporting material for the "Hunting Bugs In The Tropics" DEFCON 30 talk☆9Updated 2 years ago
- Collection of different exploitation scenarios of JWT.☆21Updated 3 years ago
- parsers to make life easier☆13Updated 4 years ago
- Zone transfers for rwhois☆20Updated 6 years ago
- Help fuzz various protocols and waits for ping backs Integrates LDAP server and JNDI payload☆11Updated 3 years ago
- Simple C2 over the Trello API☆38Updated 2 years ago
- A BurpSuite extension for beautifying .NET message parameters and hiding some of the extra clutter that comes with .NET web apps (i.e. __…☆12Updated 10 years ago