Script to automate PUT HTTP method exploitation to get shell
☆125Jun 25, 2020Updated 5 years ago
Alternatives and similar repositories for put2win
Users that are interested in put2win are comparing it to the libraries listed below
Sorting:
- Bug Bounty Clipboard☆17Nov 6, 2019Updated 6 years ago
- Interactive Post Exploitation Tool☆37Oct 1, 2019Updated 6 years ago
- Tool made to automate tasks of pentesting.☆165Oct 26, 2019Updated 6 years ago
- XXRF Shots - Useful for testing SSRF vulnerability☆74Feb 18, 2023Updated 3 years ago
- Network Assessment Assistance Framework (PenTest Toolkit).☆42Nov 18, 2019Updated 6 years ago
- Unofficial WhatCMS API package☆40Mar 25, 2021Updated 4 years ago
- Simple Karma Attack☆68Oct 1, 2020Updated 5 years ago
- ☆128May 22, 2023Updated 2 years ago
- DNS Enumeration with Asynchronicity☆45Oct 30, 2018Updated 7 years ago
- Automate Metasploit scanning and exploitation☆118Jul 20, 2025Updated 7 months ago
- The Python Password-Protected Obfuscator☆33Jul 7, 2019Updated 6 years ago
- ☆17Mar 21, 2019Updated 6 years ago
- Ruby script to automate metasploit scanning, exploitation, and post-exploitation☆18Jul 4, 2020Updated 5 years ago
- Checks using a test string if a Cloudflare DNS bypass is possible using CloudFail.☆48Dec 17, 2020Updated 5 years ago
- Reverse Shell Cheat Sheet TooL☆300May 9, 2020Updated 5 years ago
- The Shadow Attack Framework☆1,116Sep 4, 2022Updated 3 years ago
- ☆13Oct 14, 2017Updated 8 years ago
- NodeXP - A Server Side Javascript Injection tool capable of detecting and exploiting Node.js vulnerabilities☆108Jan 31, 2025Updated last year
- VyAPI - A cloud based vulnerable hybrid Android App☆86Feb 21, 2020Updated 6 years ago
- Post-Exploitation module for Penetration Tester and Hackers.☆27Dec 29, 2021Updated 4 years ago
- JShell - Get a JavaScript shell with XSS.☆532May 5, 2019Updated 6 years ago
- Automated script to search in SMB protocol for availables pipe names☆25Apr 19, 2018Updated 7 years ago
- Essential tool for finding blind injection attacks.☆50Feb 6, 2019Updated 7 years ago
- Disrupt WAF by abusing SSL/TLS Ciphers☆48Dec 19, 2018Updated 7 years ago
- Using IPv6 to Bypass Security☆92Sep 4, 2025Updated 5 months ago
- A threaded, recursive, web directory brute-force scanner over HTTP/2.☆36Feb 11, 2020Updated 6 years ago
- Tool aided persistence via Windows URI schemes abuse☆84Mar 1, 2020Updated 5 years ago
- ☆17Jan 2, 2020Updated 6 years ago
- Free and open NMAP NSE script to query vulnerabilities via the cve-search.org API.☆247Nov 17, 2019Updated 6 years ago
- An enumeration and exploitation toolkit using RFC calls to SAP☆40Jan 8, 2020Updated 6 years ago
- Network share sniffer and auto-mounter for crawling remote file systems☆212Mar 27, 2022Updated 3 years ago
- for mass exploiting☆613Jul 14, 2022Updated 3 years ago
- XIP generates a list of IP addresses by applying a set of transformations used to bypass security measures e.g. blacklist filtering, WAF,…☆77Nov 21, 2018Updated 7 years ago
- A burp extension to generate sqlmap PoC from target HTTP request.☆27Jan 8, 2017Updated 9 years ago
- DrMITM is a program designed to globally log all traffic of a website.☆28Feb 10, 2019Updated 7 years ago
- ☆66Feb 10, 2018Updated 8 years ago
- Remot3d: is a simple tool created for large pentesters as well as just for the pleasure of defacers to control server by backdoors☆284Oct 2, 2020Updated 5 years ago
- Cat-Nip Automated Basic Pentest Tool - Designed For Kali Linux☆123Apr 13, 2019Updated 6 years ago
- ArmourBird CSF - Container Security Framework☆44Apr 22, 2022Updated 3 years ago