delvelabs / htcapLinks
htcap is a web application scanner able to crawl single page application (SPA) in a recursive manner by intercepting ajax calls and DOM changes.
☆18Updated last month
Alternatives and similar repositories for htcap
Users that are interested in htcap are comparing it to the libraries listed below
Sorting:
- Minimal version for https://github.com/zmap/zgrab.☆16Updated 3 years ago
- Zabbix Jsrpc.php Injection Exploit☆25Updated 9 years ago
- cobalt strike 自启动脚本☆42Updated 8 years ago
- It is a repository for Red Team emulation based on MITRE ATT&CK.☆16Updated 6 years ago
- Kerberos accounts enumeration taking advantage of AS-REQ☆43Updated 7 years ago
- 获取系统KB补丁对于的MS号☆24Updated 6 years ago
- CVE-2020-10199 CVE-2020-10204 Python POC☆19Updated 5 years ago
- Pulse Secure SSL VPN pre-auth file reading☆50Updated 6 years ago
- Use powershell to test Office-based persistence methods☆76Updated 4 years ago
- CVE-2017-10271 WEBLOGIC RCE (TESTED)☆39Updated 7 years ago
- ☆35Updated 3 years ago
- Use to perform Microsoft exchange account brute-force.☆73Updated 4 years ago
- A proof of concept that demonstrates asynchronous scanning for Java deserialization bugs☆55Updated 8 years ago
- PoC of Remote Command Execution via Log injection on SAP NetWeaver AS JAVA CRM☆52Updated 7 years ago
- Drupal8's REST RCE, SA-CORE-2019-003, CVE-2019-6340☆71Updated 5 years ago
- Run remote system commands from Oracle connection - oracle exec command perl☆12Updated 10 years ago
- This is a filter bypass exploit that results in arbitrary file upload and remote code execution in class.upload.php <= 2.0.4☆36Updated 5 years ago
- CVE-2018-6574 POC : golang 'go get' remote command execution during source code build☆24Updated 3 years ago
- a tool to manipulate dcc(domain cached credentials) in windows registry, based mainly on the work of mimikatz and impacket☆68Updated 7 years ago
- Proof of concept written in Python to show that in some situations a SSRF vulnerability can be used to steal NTLMv1/v2 hashes.☆57Updated 7 years ago
- ☆32Updated 5 years ago
- Jira Information Gatherer☆29Updated 7 years ago
- ☆34Updated 6 years ago
- ☆24Updated 5 years ago
- Use Waitfor.exe to maintain persistence☆54Updated 4 years ago
- Docker-Remote-API-Exploit☆30Updated 7 years ago
- Environment for CVE-2019-6340 (Drupal)☆42Updated 2 years ago
- Ping Exfiltration Command and Control (PiX-C2)☆32Updated 10 years ago
- CVE-2019-6340-Drupal SA-CORE-2019-003☆32Updated 6 years ago
- ☆16Updated 7 years ago